Elisa Bertino
Orcid: 0000-0002-4029-7051Affiliations:
- Purdue University, USA
According to our database1,
Elisa Bertino
authored at least 1,091 papers
between 1981 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2003, "For contributions to secure database systems.".
IEEE Fellow
IEEE Fellow 2002, "For contributions to the theory of object-oriented databases, temporal databases, and database security.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on idref.fr
-
on acm.org
-
on viaf.org
-
on orcid.org
-
on isni.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises.
ACM Trans. Priv. Secur., August, 2024
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks.
ACM Trans. Internet Things, August, 2024
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT.
IEEE Internet Things J., April, 2024
FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level.
IEEE Trans. Knowl. Data Eng., January, 2024
ACM Trans. Knowl. Discov. Data, January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data.
CoRR, 2024
CoRR, 2024
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs.
CoRR, 2024
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning.
CoRR, 2024
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation.
Comput. Secur., 2024
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the IEEE International Conference on Software Services Engineering, 2024
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024
2023
IEEE Internet Things J., May, 2023
State of the art on quality control for data streams: A systematic literature review.
Comput. Sci. Rev., May, 2023
A knowledge graph empowered online learning framework for access control decision-making.
World Wide Web (WWW), March, 2023
IEEE Secur. Priv., 2023
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey.
ACM Comput. Surv., 2023
ACM Comput. Surv., 2023
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs.
CoRR, 2023
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements.
CoRR, 2023
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report.
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
A Universally Composable Key Exchange Framework for Operational Technology Communication Protocols.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Findings of the Association for Computational Linguistics: IJCNLP-AACL 2023, 2023
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation.
Proceedings of the IEEE International Conference on Industrial Technology, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Network Temperature: A Novel Statistical Index for Networks Measurement and Management.
ACM Trans. Internet Techn., 2022
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
ACM Trans. Internet Techn., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications.
IEEE J. Sel. Areas Commun., 2022
ACM J. Data Inf. Qual., 2022
Editorial: Special Issue on Data Transparency - Data Quality, Annotation, and Provenance.
ACM J. Data Inf. Qual., 2022
IEEE Internet Things J., 2022
IEEE Intell. Syst., 2022
Ethics Inf. Technol., 2022
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities.
Comput. Secur., 2022
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
Proceedings of the 31st USENIX Security Symposium, 2022
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems.
J. Informetrics, 2021
Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap.
Discov. Internet Things, 2021
An excellent venue for multidisciplinary research in civil and infrastructure engineering.
Comput. Aided Civ. Infrastructure Eng., 2021
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 2021 IEEE International Conference on Web Services, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
A Security-Constrained Reinforcement Learning Framework for Software Defined Networks.
Proceedings of the ICC 2021, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Knowl. Data Eng., 2020
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020
DTRAP, 2020
CoRR, 2020
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs.
Proceedings of the 2020 IEEE International Conference on Edge Computing, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the ICN '20: 7th ACM Conference on Information-Centric Networking, Virtual Event, Canada, September 29, 2020
FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Trans. Mob. Comput., 2019
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.
ACM Trans. Priv. Secur., 2019
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet.
IEEE Trans. Inf. Forensics Secur., 2019
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019
IEEE Secur. Priv., 2019
Comput. Secur., 2019
Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures.
Comput. Aided Civ. Infrastructure Eng., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the IEEE International Conference on Smart Computing, 2019
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning.
Proceedings of the IEEE International Conference on Smart Computing, 2019
Proceedings of the IEEE International Conference on Smart Computing, 2019
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019
A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
On the Quality of Classification Models for Inferring ABAC Policies from Access Logs.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
Proceedings of the Internet of Things for Smart Urban Ecosystems., 2019
2018
ACM Trans. Soc. Comput., 2018
ACM Trans. Internet Techn., 2018
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
IEEE Trans. Mob. Comput., 2018
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018
IEEE Trans. Inf. Forensics Secur., 2018
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones.
IEEE Trans. Inf. Forensics Secur., 2018
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow.
Soc. Netw. Anal. Min., 2018
Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities - Framework and Challenges.
ACM J. Data Inf. Qual., 2018
Int. J. Cooperative Inf. Syst., 2018
A context-aware system to secure enterprise content: Incorporating reliability specifiers.
Comput. Secur., 2018
Comput. Secur., 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management).
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey.
WIREs Data Mining Knowl. Discov., 2017
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection.
IEEE Trans. Software Eng., 2017
ACM Trans. Sens. Networks, 2017
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2017
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017
ACM Trans. Priv. Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts.
IEEE Syst. J., 2017
Mob. Networks Appl., 2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
IEEE Secur. Priv., 2017
Android resource usage risk assessment using hidden Markov model and online learning.
Comput. Secur., 2017
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications.
IEEE Access, 2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE World Congress on Services, 2017
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017
Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 13th IEEE International Conference on e-Science, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Android malicious application detection using support vector machine and active learning.
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Community-based self generation of policies and processes for assets: Concepts and research directions.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
WIREs Data Mining Knowl. Discov., 2016
Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks.
ACM Trans. Spatial Algorithms Syst., 2016
IEEE Trans. Parallel Distributed Syst., 2016
Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2016
ACM Trans. Internet Techn., 2016
IEEE Trans. Knowl. Data Eng., 2016
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT.
Trans. Data Priv., 2016
Trans. Data Priv., 2016
J. Inf. Secur. Appl., 2016
Concurr. Comput. Pract. Exp., 2016
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques.
IEEE Access, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Building robust temporal user profiles for anomaly detection in file system accesses.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 19th International Conference on Extending Database Technology, 2016
Proceedings of the 12th IEEE International Conference on e-Science, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
RahasNym: Pseudonymous Identity Management System for Protecting against Linkability.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Dependable Secur. Comput., 2015
J. Database Manag., 2015
Int. J. Inf. Sec., 2015
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12229-8, 2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Knowl. Data Eng., 2014
A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization.
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Dependable Secur. Comput., 2014
J. Netw. Comput. Appl., 2014
Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014
Inf. Syst. Frontiers, 2014
Int. J. Cooperative Inf. Syst., 2014
IACR Cryptol. ePrint Arch., 2014
EAI Endorsed Trans. Collab. Comput., 2014
CoRR, 2014
Comput. Secur., 2014
Kinesis: a security incident response and prevention system for wireless sensor networks.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the Hybrid Artificial Intelligence Systems - 9th International Conference, 2014
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Database and Expert Systems Applications, 2014
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02337-8, 2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02340-8, 2013
IEEE Trans. Serv. Comput., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Knowl. Data Eng., 2013
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Internet Comput., 2013
Computer, 2013
Encryption key management for secure communication in smart advanced metering infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
A secure architecture design based on application isolation, code minimization and randomization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013
2012
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01890-9, 2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Secur. Commun. Networks, 2012
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012
IACR Cryptol. ePrint Arch., 2012
Expert Syst. Appl., 2012
IEEE Data Eng. Bull., 2012
CoRR, 2012
Comput. Secur., 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012
A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the Advances in Conceptual Modeling, 2012
Proceedings of the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, 2012, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 8th International Conference on Network and Service Management, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Web, 2011
IEEE Trans. Knowl. Data Eng., 2011
IEEE Trans. Dependable Secur. Comput., 2011
On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Pervasive Comput., 2011
J. Organ. Comput. Electron. Commer., 2011
ACM Journal on Computing and Cultural Heritage, 2011
Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach.
J. Comput. Syst. Sci., 2011
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011
Expert Syst. Appl., 2011
Comput. Stand. Interfaces, 2011
Acta Informatica, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011
Location-based access control systems for mobile users: concepts and research directions.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011
Secure cryptographic key management system (CKMS) considerations for smart grid devices.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011
2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
IEEE Trans. Parallel Distributed Syst., 2010
Trans. Data Priv., 2010
IEEE Internet Comput., 2010
Int. J. Inf. Sec., 2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
A secure multiparty computation privacy preserving OLAP framework over distributed XML data.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Proceedings of the E-Government, E-Services and Global Processes, 2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010
Privacy-preserving matching of spatial datasets with protection against background knowledge.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010
Proceedings of the EDBT 2010, 2010
Proceedings of the 7th Workshop on Data Management for Sensor Networks, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010
A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Database Technologies 2010, 2010
Springer, ISBN: 978-3-540-87741-7, 2010
2009
IEEE Trans. Serv. Comput., 2009
J. Supercomput., 2009
Trans. Data Priv., 2009
Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS.
Trans. Data Priv., 2009
ACM SIGSPATIAL Special, 2009
Proc. VLDB Endow., 2009
A distributed approach to enabling privacy-preserving model-based classifier training.
Knowl. Inf. Syst., 2009
Int. J. Web Serv. Res., 2009
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw., 2009
Inf. Sci., 2009
Int. J. Inf. Sec., 2009
IEEE Data Eng. Bull., 2009
Proceedings of the Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, 2009
Proceedings of the Advances in Spatial and Temporal Databases, 2009
Proceedings of the Advances in Spatial and Temporal Databases, 2009
Effective and efficient implementation of an information flow control protocol for service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
<i>StreamShield</i>: a stream-centric approach towards security and privacy in data stream environments.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the POLICY 2009, 2009
VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices.
Proceedings of the MDM 2009, 2009
Proceedings of the MDM 2009, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the IDtrust 2009, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the ICPPW 2009, 2009
Proceedings of the Object Databases, Second International Conference, 2009
A Comprehensive Approach for Solving Policy Heterogeneity.
Proceedings of the ICEIS 2009, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009
Proceedings of the EDBT 2009, 2009
Proceedings of the Database Systems for Advanced Applications, 2009
Proceedings of the Database Systems for Advanced Applications, 2009
An assessment of accountability policies for large-scale distributed computing systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the IEEE International Conference on Cloud Computing, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
IEEE Trans. Syst. Man Cybern. Part C, 2008
IEEE Trans. Parallel Distributed Syst., 2008
IEEE Trans. Parallel Distributed Syst., 2008
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries.
IEEE Trans. Parallel Distributed Syst., 2008
IEEE Trans. Knowl. Data Eng., 2008
ACM Trans. Inf. Syst. Secur., 2008
IEEE Trans. Dependable Secur. Comput., 2008
J. Netw. Syst. Manag., 2008
J. Intell. Inf. Syst., 2008
IEEE Internet Comput., 2008
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the Proceedings P2P'08, 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Trust Management II, 2008
Proceedings of the Service-Oriented Computing, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008
End-to-end accountability in grid computing systems for coalition information sharing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Sharing Data, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.
Proceedings of the The Third International Conference on Availability, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
IEEE Trans. Dependable Secur. Comput., 2007
J. Comput. Secur., 2007
Int. J. Inf. Sec., 2007
Int. J. Inf. Comput. Secur., 2007
IEEE Secur. Priv., 2007
Data Knowl. Eng., 2007
An integrated approach to federated identity and privilege management in open systems.
Commun. ACM, 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the Test and Analysis of Web Services, 2007
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 2007 Workshop on Digital Identity Management, 2007
Proceedings of the 2007 Workshop on Digital Identity Management, 2007
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007
Proceedings of the Advances in Databases: Concepts, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
IEEE Trans. Software Eng., 2006
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems.
ACM Trans. Inf. Syst. Secur., 2006
IEEE Trans. Dependable Secur. Comput., 2006
Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges.
SIGMOD Rec., 2006
J. Comput. Secur., 2006
Int. J. Web Based Communities, 2006
Integration of virtual reality and database systems for cultural heritage dissemination.
Int. J. Comput. Sci. Eng., 2006
A multigranular object-oriented framework supporting spatio-temporal granularity conversions.
Int. J. Geogr. Inf. Sci., 2006
A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy).
Comput. Geosci., 2006
Foreword.
Ann. des Télécommunications, 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Beyond <i>k</i>-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.
Proceedings of the Privacy in Statistical Databases, 2006
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Pacific Asia Conference on Information Systems, 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the 22nd International Conference on Data Engineering, 2006
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints.
Proceedings of the 22nd International Conference on Data Engineering, 2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
Proceedings of the 2006 Workshop on Digital Identity Management, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
A semantic approach to build personalized interfaces in the cultural heritage domain.
Proceedings of the working conference on Advanced visual interfaces, 2006
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
IEEE Trans. Knowl. Data Eng., 2005
X-gtrbac admin: A decentralized administration model for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005
An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Dependable Secur. Comput., 2005
IEEE Trans. Dependable Secur. Comput., 2005
J. Comput. Secur., 2005
Distributed Parallel Databases, 2005
Data Min. Knowl. Discov., 2005
Proceedings of the W3C Workshop on Rule Languages for Interoperability, 2005
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study.
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Innovations in Applied Artificial Intelligence, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the Foundations of Security Analysis and Design III, 2005
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005
Access control management in a distributed environment supporting dynamic collaboration.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Proceedings of the Data Warehousing and Knowledge Discovery, 2005
Proceedings of the Database Systems for Advanced Applications, 2005
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
2004
Proceedings of the Practical Handbook of Internet Computing., 2004
IEEE Trans. Knowl. Data Eng., 2004
IEEE Trans. Knowl. Data Eng., 2004
Multim. Tools Appl., 2004
A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications.
Inf. Syst., 2004
IEEE Internet Comput., 2004
Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations.
Int. J. Softw. Eng. Knowl. Eng., 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 2004
Exploiting User-Profiles for the Selective Dissemination of XML Documents.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004
X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Intl. Workshop on Pattern Representation and Management, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the 8th International Database Engineering and Applications Symposium (IDEAS 2004), 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
Proceedings of the 12th ACM International Workshop on Geographic Information Systems, 2004
Proceedings of the 12th ACM International Workshop on Geographic Information Systems, 2004
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004
Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
Proceedings of the Digital Library Architectures: Peer-to-Peer, 2004
Proceedings of the Communications and Multimedia Security, 2004
Purpose based access control for privacy protection.
Proceedings of the 20èmes Journées Bases de Données Avancées, 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
Proceedings of the Intelligent Exploration of the Web, 2003
Theory Pract. Log. Program., 2003
ACM Trans. Inf. Syst., 2003
IEEE Trans. Knowl. Data Eng., 2003
ACM Trans. Inf. Syst. Secur., 2003
SIGMOD Rec., 2003
T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management.
Inf. Syst., 2003
Int. J. Inf. Sec., 2003
Hierarchical data placement for navigational multimedia applications.
Data Knowl. Eng., 2003
Concurr. Comput. Pract. Exp., 2003
ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage.
Proceedings of the SIGGRAPH 2003 Conference on Sketches & Applications: in conjunction with the 30th annual conference on Computer graphics and interactive techniques, 2003
Memorizzazione di regole per l'instradamento di messaggi in un sistema di comunicazione universale.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003
Grid Based Methods for the Spatial Join Estimation.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003
PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003
An abstraction-based approach to measuring the structural similarity between two unordered XML documents.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003
A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003
Proceedings of the ACM-GIS 2003, 2003
Proceedings of the Computer Security, 2003
Proceedings of the Databases in Networked Information Systems, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003
Proceedings of the Communications and Multimedia Security, 2003
Local Closed-World Assumptions for reasoning about Semantic Web data.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003
User Preferences VS Minimality in PPDL.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
ACM Trans. Inf. Syst. Secur., 2002
IEEE Internet Comput., 2002
IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web.
IEEE Distributed Syst. Online, 2002
Distributed Parallel Databases, 2002
Data Knowl. Eng., 2002
Proceedings of the 9th International Symposium on Temporal Representation and Reasoning, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002
Rules Termination Analysis investigating the interaction between transactions and triggers.
Proceedings of the International Database Engineering & Applications Symposium, 2002
An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002
Distributed Cooperative Updates of XML Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Theory Pract. Log. Program., 2001
Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'.
IEEE Trans. Knowl. Data Eng., 2001
ACM Trans. Inf. Syst. Secur., 2001
ACM Trans. Inf. Syst. Secur., 2001
Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries.
Fundam. Informaticae, 2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the Eleventh International Workshop on Research Issues in Data Engineering: Document Management for Data Intensive Business and Scientific Applications, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001
Intelligent Database Systems
Addison-Wesley, ISBN: 0-201-87736-8, 2001
2000
World Wide Web, 2000
IEEE Trans. Knowl. Data Eng., 2000
IEEE Trans. Knowl. Data Eng., 2000
IEEE Trans. Knowl. Data Eng., 2000
IEEE Trans. Knowl. Data Eng., 2000
MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations.
IEEE Trans. Knowl. Data Eng., 2000
Softw. Pract. Exp., 2000
J. Comput. Secur., 2000
J. Comput. Secur., 2000
Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels.
ACM SIGMOD Digit. Rev., 2000
ACM SIGMOD Digit. Rev., 2000
ACM SIGMOD Digit. Rev., 2000
Distributed Parallel Databases, 2000
Triggers in Java-based Databases.
Obj. Logiciel Base données Réseaux, 2000
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000
A Semi-automatic System for Conceptual Annotation, its Application to Resource Construction and Evaluation.
Proceedings of the Second International Conference on Language Resources and Evaluation, 2000
Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries.
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000
Proceedings of the Advances in Exception Handling Techniques (the book grow out of a ECOOP 2000 workshop), 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
Proceedings of the 2000 ACM CIKM International Conference on Information and Knowledge Management, 2000
1999
ACM Trans. Inf. Syst., 1999
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999
Object-Oriented Databases and Applications - Selected Papers from ICDE'98.
Theory Pract. Object Syst., 1999
J. Comput. Secur., 1999
ACM SIGMOD Digit. Rev., 1999
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1999
CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents.
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the 15th International Conference on Data Engineering, 1999
Inheritance in a Deductive Object Database Language with Updates.
Proceedings of the Transactions and Database Dynamics, 1999
Proceedings of the Mobile Networks and Computing, 1999
Proceedings of the Database Systems for Advanced Applications, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999
Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999
1998
ACM Trans. Database Syst., 1998
IEEE Trans. Knowl. Data Eng., 1998
IEEE Trans. Knowl. Data Eng., 1998
ACM Trans. Inf. Syst. Secur., 1998
Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
Theory Pract. Object Syst., 1998
Multim. Syst., 1998
J. Intell. Inf. Syst., 1998
Inf. Syst., 1998
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998
Proceedings of the 1998 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1998
Proceedings of the Computer Security, 1998
Proceedings of the Advances in Database Technology, 1998
Proceedings of the Transactions and Change in Logic Databases, 1998
Proceedings of the Principles and Practice of Constraint Programming, 1998
Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
Proceedings of the Application and Theory of Petri Nets 1998, 1998
1997
IEEE Trans. Knowl. Data Eng., 1997
IEEE Trans. Knowl. Data Eng., 1997
IEEE Trans. Knowl. Data Eng., 1997
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997
A Formal View of Object-Oriented Database Systems.
Theory Pract. Object Syst., 1997
T_Chimera: A Temporal Object-Oriented Data Model.
Theory Pract. Object Syst., 1997
Inf. Process. Lett., 1997
Inf. Softw. Technol., 1997
Proceedings of the Advances in Spatial Databases, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the SIGMOD 1997, 1997
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997
Administration Policies in a Multipolicy Autorization System.
Proceedings of the Database Securty XI: Status and Prospects, 1997
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Proceedings of the Database Securty XI: Status and Prospects, 1997
An Execution Model for Multilevel Seccure Workflows.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Proceedings of the Constraint Databases and Their Applications, 1997
Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997
Advances in Database Systems 8, Kluwer, ISBN: 0-7923-9985-4, 1997
1996
IEEE Trans. Knowl. Data Eng., 1996
IEEE Trans. Knowl. Data Eng., 1996
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996
On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the SOFSEM '96: Theory and Practice of Informatics, 1996
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996
A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996
Proceedings of the Advances in Database Technology, 1996
Proceedings of the CCS '96, 1996
Proceedings of the CCS '96, 1996
A Data Access Structure for Filtering Distance Queries in Image Retrieval.
Proceedings of the Multimedia Database System: Issues and Research Direction, 1996
1995
IEEE Trans. Knowl. Data Eng., 1995
Towards Deductice Object Databases.
Theory Pract. Object Syst., 1995
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995
Query Decomposition in an Object-Oriented Database System Distributed on a Local Area Network.
Proceedings of the Proceedings RIDE-DOM '95, Fifth International Workshop on Research Issues in Data Engineering, 1995
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995
Database Monitoring in U-Datalog.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995
Proceedings of the Constraint Databases and Applications, 1995
1994
Applications of Object-Oriented Technology to the Integration of Heterogeneous Database Systems.
Distributed Parallel Databases, 1994
Data Knowl. Eng., 1994
Index Configurations in Object-Oriented Databases.
Proceedings of the TOOLS 1994: 13th International Conference on Technology of Object-Oriented Languages and Systems, 1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Proceedings of the Fourth International Workshop on Research Issues in Data Engineering: Active Database Systems, 1994
Proceedings of the 1994 International Conference on Object Oriented Information Systems, 1994
Proceedings of the 1994 Workshop on New Security Paradigms, 1994
Proceedings of the Tenth International Conference on Data Engineering, 1994
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Proceedings of the Computer Security, 1994
Proceedings of the Object-Oriented Programming, Proceedings of the 8th European Conference, 1994
Static Analysis of Transactional Intensional Databases.
Proceedings of the Workshop on Deductive Databases and Logic Programming, 1994
A new Authorization Model for Object-Oriented Databases.
Proceedings of the Database Security, 1994
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994
A Bottom-Up Interpreter for a Database Language with Updates and Transactions.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994
1993
Proceedings of the Advanced Database Systems, 1993
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
J. Comput. Secur., 1993
Data Knowl. Eng., 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Research Issues in Discretionary Authorizations for Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993
Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the Deductive and Object-Oriented Databases, Third International Conference, 1993
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993
Proceedings of the CIKM 93, 1993
Proceedings of the CCS '93, 1993
Proceedings of the CCS '93, 1993
Formalizzazione e Ottimizzazione di Transazioni di modifica in CLP(AD).
Proceedings of the 8th Italian Conference on Logic Programming, 1993
Object-Oriented Database Systems
Addison-Wesley, ISBN: 0-201-62439-7, 1993
1992
IEEE Trans. Knowl. Data Eng., 1992
Proceedings of the RIDE-TQP '92, 1992
Proceedings of the RIDE-TQP '92, 1992
An Analytical Model of Object-Oriented Query Costs.
Proceedings of the Persistent Object Systems, 1992
A Knowledge Based Information System.
Proceedings of the Personal Computers and Intelligent Systems, 1992
Proceedings of the Eighth International Conference on Data Engineering, 1992
Multimedia Data Handling in a Knowledge Representation System.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992
The ADKMS Knowledge Acquisition System.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992
Proceedings of the Modelling Database Dynamics, 1992
Proceedings of the Extensions of Logic Programming, Third International Workshop, 1992
Proceedings of the Advances in Database Technology, 1992
Proceedings of the Advances in Database Technology, 1992
Modeling Database Updates with Constraint Logic Programming.
Proceedings of the Workshop on Deductive Databases held in conjunction with the Joint International Conference and Symposium on Logic Programming, 1992
CLP (X) as a framework for action and deduction.
Proceedings of the CNKBS'92, 1992
An Approach to Integrate Multimedi Data in a Knowledge Representation System.
Proceedings of the Advanced Visual Interfaces - Proceedings of the International Workshop, 1992
Sistemi di basi di dati orientate agli oggetti - concetti e architetture.
Addison-Wesley, ISBN: 978-88-7192-036-8, 1992
1991
ACM Trans. Database Syst., 1991
Integration of Heterogeneous Data Repositories by Using Object-Oriented Views.
Proceedings of the RIDE-IMS '91, 1991
Proceedings of the Seventh International Conference on Data Engineering, 1991
Proceedings of the Conference on Organizational Computing Systems, 1991
A Survey of Indexing Techniques for Object-Oriented Database Management Systems.
Proceedings of the Query Processing for Advanced Database Systems, 1991
1990
Proceedings of the Advances in Database Technology, 1990
Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990
Proceedings of the ACM SIGOIS and IEEE CS TC-OA Conference on Office Information Systems, 1990
1989
IEEE Trans. Knowl. Data Eng., 1989
Integration of heterogeneous database applications through an object-oriented interface.
Inf. Syst., 1989
Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, Portland, Oregon, USA, May 31, 1989
1988
The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System.
Perform. Evaluation, 1988
Acta Informatica, 1988
The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications.
Proceedings of the Advances in Object-Oriented Database Systems, 1988
Proceedings of the ACM SIGOIS and IEEECS TC-OA 1988 Conference on Office Information Systems, 1988
Proceedings of the Advances in Database Technology, 1988
Proceedings of the Advances in Database Technology, 1988
1987
An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems.
Comput. J., 1987
1986
1984
Proceedings of the Tenth International Conference on Very Large Data Bases, 1984
1983
Proceedings of the 9th International Conference on Very Large Data Bases, October 31, 1983
Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases.
Proceedings of the Third Symposium on Reliability in Distributed Software and Database Systems, 1983
The Update Problem in the Distributed Database System Hermes/1.
Proceedings of the Second International Conference On Databases, 1983
Distributed Database Design Using the Entity-Relationship Model.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983
1982
IEEE Database Eng. Bull., 1982
1981
Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System.
Proceedings of the Trends in Information Processing Systems, 1981