Elisa Bertino

Orcid: 0000-0002-4029-7051

Affiliations:
  • Purdue University, USA


According to our database1, Elisa Bertino authored at least 1,075 papers between 1981 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2003, "For contributions to secure database systems.".

IEEE Fellow

IEEE Fellow 2002, "For contributions to the theory of object-oriented databases, temporal databases, and database security.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT.
IEEE Internet Things J., April, 2024

FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level.
IEEE Trans. Knowl. Data Eng., January, 2024

Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency.
ACM Trans. Knowl. Discov. Data, January, 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

Transfer Learning for Security: Challenges and Future Directions.
CoRR, 2024

FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning.
CoRR, 2024

2023
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things.
IEEE Internet Things J., May, 2023

State of the art on quality control for data streams: A systematic literature review.
Comput. Sci. Rev., May, 2023

A knowledge graph empowered online learning framework for access control decision-making.
World Wide Web (WWW), March, 2023

Trustworthy AI and Data Lineage.
IEEE Internet Comput., 2023

Privacy in the Era of 5G, IoT, Big Data, and Machine Learning.
IEEE Secur. Priv., 2023

Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey.
ACM Comput. Surv., 2023

PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols.
ACM Comput. Surv., 2023

Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs.
CoRR, 2023

FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.
CoRR, 2023

Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode.
CoRR, 2023

Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements.
CoRR, 2023

Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report.
CoRR, 2023

TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support.
CoRR, 2023

Maximal Domain Independent Representations Improve Transfer Learning.
CoRR, 2023

AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN.
Proceedings of the ACM Web Conference 2023, 2023

Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Proceedings of the 32nd USENIX Security Symposium, 2023

BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Universally Composable Key Exchange Framework for Operational Technology Communication Protocols.
Proceedings of the IEEE International Conference on Communications, 2023

SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis.
Proceedings of the Findings of the Association for Computational Linguistics: IJCNLP-AACL 2023, 2023

Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation.
Proceedings of the IEEE International Conference on Industrial Technology, 2023

Welcome Message.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Towards Efficient Privacy-Preserving Deep Packet Inspection.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Pro-Active Defense Framework for IoT Systems.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

FLAP - A Federated Learning Framework for Attribute-based Access Control Policies.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Guest Editor's Introduction: Special Section on EdgeAI as a Service.
IEEE Trans. Serv. Comput., 2022

A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations.
IEEE Trans. Serv. Comput., 2022

AQA: An Adaptive Quality Assessment Framework for Online Review Systems.
IEEE Trans. Serv. Comput., 2022

Network Temperature: A Novel Statistical Index for Networks Measurement and Management.
ACM Trans. Internet Techn., 2022

A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
ACM Trans. Internet Techn., 2022

Compact Provenance Scheme Through Packet Path Index Differences in WSNs.
IEEE Trans. Inf. Forensics Secur., 2022

Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

Analysis of Encryption Key Generation in Modern Crypto Ransomware.
IEEE Trans. Dependable Secur. Comput., 2022

Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications.
IEEE J. Sel. Areas Commun., 2022

Editorial: Special Issue on Data Transparency - Uses Cases and Applications.
ACM J. Data Inf. Qual., 2022

Editorial: Special Issue on Data Transparency - Data Quality, Annotation, and Provenance.
ACM J. Data Inf. Qual., 2022

Special issue ESORICS 2021.
J. Comput. Secur., 2022

Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs.
IEEE Internet Things J., 2022

The Persistent Problem of Software Insecurity.
IEEE Secur. Priv., 2022

CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection.
IEEE Intell. Syst., 2022

A framework for the application of socio-technical design methodology.
Ethics Inf. Technol., 2022

EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry.
CoRR, 2022

SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities.
Comput. Secur., 2022

Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
Proceedings of the 31st USENIX Security Symposium, 2022

Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Subspace Embedding Based New Paper Recommendation.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022


NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

The Lannion report on Big Data and Security Monitoring Research.
Proceedings of the IEEE International Conference on Big Data, 2022

VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
ProFact: A Provenance-Based Analytics Framework for Access Control Policies.
IEEE Trans. Serv. Comput., 2021

Privacy Preserving Location-Aware Personalized Web Service Recommendations.
IEEE Trans. Serv. Comput., 2021

A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles.
IEEE Trans. Dependable Secur. Comput., 2021

Robust and Universal Seamless Handover Authentication in 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems.
J. Informetrics, 2021

Zero Trust Architecture: Does It Help?
IEEE Secur. Priv., 2021

Attacks on Artificial Intelligence [Last Word].
IEEE Secur. Priv., 2021

Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap.
Discov. Internet Things, 2021

Simeon - Secure Federated Machine Learning Through Iterative Filtering.
CoRR, 2021

Computing Research Challenges in Next Generation Wireless Networking.
CoRR, 2021

An excellent venue for multidisciplinary research in civil and infrastructure engineering.
Comput. Aided Civ. Infrastructure Eng., 2021

Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Learning Domain Semantics and Cross-Domain Correlations for Paper Recommendation.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

AI-powered Network Security: Approaches and Research Directions.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021

Scalable Non-observational Predicate Learning in ASP.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Services for Zero Trust Architectures - A Research Roadmap.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

A Security-Constrained Reinforcement Learning Framework for Software Defined Networks.
Proceedings of the ICC 2021, 2021

AI for Security and Security for AI.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Crypto-Chain: A Relay Resilience Framework for Smart Vehicles.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Edge-Based Intrusion Detection for IoT devices.
ACM Trans. Manag. Inf. Syst., 2020

A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles.
IEEE Trans. Mob. Comput., 2020

Privacy-Preserving User Profile Matching in Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks.
Proc. Priv. Enhancing Technol., 2020

AI-driven data security and privacy.
J. Netw. Comput. Appl., 2020

The Quest for Data Transparency.
IEEE Secur. Priv., 2020

Artificial Intelligence & Cooperation.
CoRR, 2020

Artificial Intelligence at the Edge.
CoRR, 2020

Black-box Model Inversion Attribute Inference Attacks on Classification Models.
CoRR, 2020

5G Security and Privacy: A Research Roadmap.
CoRR, 2020

Security of cellular networks position paper.
CCF Trans. Netw., 2020

Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs.
Proceedings of the 2020 IEEE World Congress on Services, 2020

On Security Policy Migrations.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Practical Anonymous Subscription with Revocation Based on Broadcast Encryption.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Privacy-preserving Real-time Anomaly Detection Using Edge Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Jarvis: Moving Towards a Smarter Internet of Things.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Polisma - A Framework for Learning Attribute-Based Access Control Policies.
Proceedings of the Computer Security - ESORICS 2020, 2020

Developing A Compelling Vision for Winning the Cybersecurity Arms Race.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Real-time Digital Signatures for Named Data Networking.
Proceedings of the ICN '20: 7th ACM Conference on Information-Centric Networking, Virtual Event, Canada, September 29, 2020

FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Robust Sensor Localization against Known Sensor Position Attacks.
IEEE Trans. Mob. Comput., 2019

Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.
ACM Trans. Priv. Secur., 2019

Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet.
IEEE Trans. Inf. Forensics Secur., 2019

Privacy Techniques for Edge Computing Systems.
Proc. IEEE, 2019

Data Transparency with Blockchain and AI Ethics.
ACM J. Data Inf. Qual., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

How Deep Learning Is Making Information Security More Intelligent.
IEEE Secur. Priv., 2019

It Takes a Village to Secure Cellular Networks.
IEEE Secur. Priv., 2019

Methods and Tools for Policy Analysis.
ACM Comput. Surv., 2019

Federated Learning for Coalition Operations.
CoRR, 2019

Redefining Data Transparency: A Multidimensional Approach.
Computer, 2019

A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration.
Comput. Secur., 2019

Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures.
Comput. Aided Civ. Infrastructure Eng., 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

Insecure connection bootstrapping in cellular networks: the root of all evil.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

On the Impact of Generative Policies on Security Metrics.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Generative Policy Framework for AI Training Data Curation.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

A Generative Policy Model for Connected and Autonomous Vehicles.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Generative Policies for Coalition Systems - A Symbolic Learning Framework.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Generating Client Side Policies for Cyber-Physical Safety.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.
Proceedings of the Computer Security - ESORICS 2019, 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

IoT Security A Comprehensive Life Cycle Framework.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Result-Based Detection of Insider Threats to Relational Databases.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Exploring The Interaction Effects for Temporal Spatial Behavior Prediction.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

E-Spion: A System-Level Intrusion Detection System for IoT Devices.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Policy based Ensembles for applying ML on Big Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Access Control Model Extensions to Support Data Privacy Protection based on GDPR.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Towards a Neural-Symbolic Generative Policy Model.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

On the Quality of Classification Models for Inferring ABAC Policies from Access Logs.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Representing and Learning Grammars in Answer Set Programming.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Optimal Placement of Security Resources for the Internet of Things.
Proceedings of the Internet of Things for Smart Urban Ecosystems., 2019

2018
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage.
ACM Trans. Soc. Comput., 2018

A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems.
ACM Trans. Internet Techn., 2018

Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
IEEE Trans. Mob. Comput., 2018

Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018

Android User Privacy Preserving Through Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2018

PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones.
IEEE Trans. Inf. Forensics Secur., 2018

Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow.
Soc. Netw. Anal. Min., 2018

Highly efficient randomized authentication in VANETs.
Pervasive Mob. Comput., 2018

The Challenge of Access Control Policies Quality.
ACM J. Data Inf. Qual., 2018

Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities - Framework and Challenges.
ACM J. Data Inf. Qual., 2018

A Comprehensive Query Language for Provenance Information.
Int. J. Cooperative Inf. Syst., 2018

A context-aware system to secure enterprise content: Incorporating reliability specifiers.
Comput. Secur., 2018

Editorial: Security and privacy protection vs sustainable development.
Comput. Secur., 2018

Towards a Privacy-Aware Qunatified Self Data Management Framework.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Network Policy Enforcement Using Transactions: The NEUTRON Approach.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Reactive Access Control Systems.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Self-Generation of Access Control Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Securing Named Data Networks: Challenges and the Way Forward.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

RWGuard: A Real-Time Detection System Against Cryptographic Ransomware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Decentralized Public Key Infrastructure for Internet-of-Things.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Hybrid Differentially-Private String Matching.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management).
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Security Issues for Distributed Fusion in Coalition Environments.
Proceedings of the 21st International Conference on Information Fusion, 2018

A Policy System for Control of Data Fusion Processes and Derived Data.
Proceedings of the 21st International Conference on Information Fusion, 2018

Self-Generating Policies for Machine Learning in Coalition Environments.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Techniques and Systems for Anomaly Detection in Database Systems.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

AGENP: An ASGrammar-based GENerative Policy Framework.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Blockchain-Based PKI Solutions for IoT.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Detection of Temporal Data Ex-Filtration Threats to Relational Databases.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Big Data Security and Privacy.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey.
WIREs Data Mining Knowl. Discov., 2017

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection.
IEEE Trans. Software Eng., 2017

Sensor Network Provenance Compression Using Dynamic Bayesian Networks.
ACM Trans. Sens. Networks, 2017

A System for Response and Prevention of Security Incidents in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2017

Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017

Pareto Optimal Security Resource Allocation for Internet of Things.
ACM Trans. Priv. Secur., 2017

Real-Time Digital Signatures for Time-Critical Networks.
IEEE Trans. Inf. Forensics Secur., 2017

A Collaborative DDoS Defence Framework Using Network Function Virtualization.
IEEE Trans. Inf. Forensics Secur., 2017

Editor's Note.
IEEE Trans. Dependable Secur. Comput., 2017

DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts.
IEEE Syst. J., 2017

Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy.
Mob. Networks Appl., 2017

Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Heimdall: Mitigating the Internet of Insecure Things.
IEEE Internet Things J., 2017

Overview of Mobile Containerization Approaches and Open Research Directions.
IEEE Secur. Priv., 2017

Editorial.
Data Sci. Eng., 2017

Security and privacy in social networks.
Concurr. Comput. Pract. Exp., 2017

Botnets and Internet of Things Security.
Computer, 2017

Android resource usage risk assessment using hidden Markov model and online learning.
Comput. Secur., 2017

Extending social networks with delegation.
Comput. Secur., 2017

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications.
IEEE Access, 2017

Fine-Grained Analysis of Packet Loss in MANETs.
IEEE Access, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Towards an architecture for policy-based management of software defined coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Generative policy model for autonomic management.
Proceedings of the 2017 IEEE SmartWorld, 2017

Argumentation-based policy analysis for drone systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Decision-making in policy governed human-autonomous systems teams.
Proceedings of the 2017 IEEE SmartWorld, 2017

Next generation firewalls for dynamic coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Provenance-Based Analytics Services for Access Control Policies.
Proceedings of the 2017 IEEE World Congress on Services, 2017

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Distributed Intelligence: Trends in the Management of Complex Systems.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

No one can track you: Randomized authentication in Vehicular Ad-hoc Networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Mission Support for Drones: a Policy Based Approach.
Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, 2017

Learning information release policies for preventing intersection attacks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

A Game of Things: Strategic Allocation of Security Resources for IoT.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Security and Privacy in the IoT.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Shortfall-Based Optimal Security Provisioning for Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Privacy Preserving User-Based Recommender System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Proceedings of the Computer Security - ESORICS 2017, 2017

Provenance-Based Scientific Workflow Search.
Proceedings of the 13th IEEE International Conference on e-Science, 2017

Detection of Temporal Insider Threats to Relational Databases.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Seamless and Secure Bluetooth LE Connection Migration.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Android malicious application detection using support vector machine and active learning.
Proceedings of the 13th International Conference on Network and Service Management, 2017

MIST 2017: 9th International Workshop on Managing Insider Security Threats.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

CCS 2017: Women in Cyber Security (CyberW) Workshop.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Memory Safety for Embedded Devices with nesCheck.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Research challenges in dynamic policy-based autonomous security.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Community-based self generation of policies and processes for assets: Concepts and research directions.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Do Sticky Elites Produce Online Knowledge of Higher Quality?
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Privacy-Preserving Multi-Party Analytics over Arbitrarily Partitioned Data.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Data and syntax centric anomaly detection for relational databases.
WIREs Data Mining Knowl. Discov., 2016

Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks.
ACM Trans. Spatial Algorithms Syst., 2016

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2016

Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2016

Internet of Things (IoT): Smart and Secure Service Delivery.
ACM Trans. Internet Techn., 2016

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy.
IEEE Trans. Knowl. Data Eng., 2016

Private Cell Retrieval From Data Warehouses.
IEEE Trans. Inf. Forensics Secur., 2016

Editor's Note.
IEEE Trans. Dependable Secur. Comput., 2016

The State of the Journal Editorial.
IEEE Trans. Dependable Secur. Comput., 2016

pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT.
Trans. Data Priv., 2016

DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Trans. Data Priv., 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

Editorial of special issue on security and privacy in cloud computing.
J. Inf. Secur. Appl., 2016

GeoInformatica welcomes a new co-editor-in-chief.
GeoInformatica, 2016

Provenance for Wireless Sensor Networks: A Survey.
Data Sci. Eng., 2016

A Data-Driven Evaluation for Insider Threats.
Data Sci. Eng., 2016

Editorial: Introduction to <i>Data Security and Privacy</i>.
Data Sci. Eng., 2016

Introduction to Data Science and Engineering.
Data Sci. Eng., 2016

Protecting outsourced data in cloud computing through access management.
Concurr. Comput. Pract. Exp., 2016

Security Threats: Protecting the New Cyberfrontier.
Computer, 2016

Securing Mobile Applications.
Computer, 2016

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques.
IEEE Access, 2016

A Context-Aware System to Secure Enterprise Content.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

An Application Restriction System for Bring-Your-Own-Device Scenarios.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Building robust temporal user profiles for anomaly detection in file system accesses.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Security Framework for a Drone Delivery Service.
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

User Preference Based Link Inference for Social Network.
Proceedings of the IEEE International Conference on Web Services, 2016

Practical privacy-preserving user profile matching in social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Strategic Security Resource Allocation for Internet of Things.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Data Security and Privacy in the IoT.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

SimP: Secure interoperable multi-granular provenance framework.
Proceedings of the 12th IEEE International Conference on e-Science, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Data Security and Privacy: Concepts, Approaches, and Research Directions.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

RahasNym: Pseudonymous Identity Management System for Protecting against Linkability.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Differentially Private K-Means Clustering.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

PANDDE: Provenance-based ANomaly Detection of Data Exfiltration.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

MIST 2016: 8th International Workshop on Managing Insider Security Threats.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Inside Attack Filtering for Robust Sensor Localization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Data privacy for IoT systems: Concepts, approaches, and research directions.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
XACML Policy Evaluation with Dynamic Context Handling.
IEEE Trans. Knowl. Data Eng., 2015

Privacy-Preserving Detection of Sensitive Data Exposure.
IEEE Trans. Inf. Forensics Secur., 2015

Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Interdependent Security Risk Analysis of Hosts and Flows.
IEEE Trans. Inf. Forensics Secur., 2015

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015

Context-Based Access Control Systems for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2015

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
IEEE Trans. Dependable Secur. Comput., 2015

Marlin: Mitigating Code Reuse Attacks Using Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2015

A Distributed System for The Management of Fine-grained Provenance.
J. Database Manag., 2015

Scalable end-to-end security for advanced metering infrastructures.
Inf. Syst., 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Denial-of-Service Attacks to UMTS.
Computer, 2015

Building Sensor-Based Big Data Cyberinfrastructures.
IEEE Cloud Comput., 2015

Big Data for Open Digital Innovation - A Research Roadmap.
Big Data Res., 2015

In the shadows we trust: A secure aggregation tolerant watermark for data streams.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices.
Proceedings of the Network and System Security - 9th International Conference, 2015

A trust assessment framework for streaming data in WSNs using iterative filtering.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

Cybersecurity for product lifecycle management a research roadmap.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Collaborative Reputation System Based on Credibility Propagation in WSNs.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Adaptive Trust Update Frequency in MANETs.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

RahasNym: Protecting against Linkability in the Digital Identity Ecosystem.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

DetAnom: Detecting Anomalous Database Transactions by Insiders.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

MIST 2015: 7th International Workshop on Managing Insider Security Threats.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Privacy-Preserving Association Rule Mining in Cloud Computing.
Proceedings of the 10th ACM Symposium on Information, 2015

A Secure Communication Protocol for Drones and Smart Objects.
Proceedings of the 10th ACM Symposium on Information, 2015

Big Data - Security and Privacy.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
Homomorphic Encryption and Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12229-8, 2014

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

Privacy-Preserving and Content-Protecting Location Based Queries.
IEEE Trans. Knowl. Data Eng., 2014

Privacy Preserving Delegated Access Control in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization.
IEEE Trans. Knowl. Data Eng., 2014

Secure kNN Query Processing in Untrusted Cloud Environments.
IEEE Trans. Knowl. Data Eng., 2014

Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Secur. Comput., 2014

IdentiDroid: Android can finally Wear its Anonymous Suit.
Trans. Data Priv., 2014

Attribute Based Group Key Management.
Trans. Data Priv., 2014

Detecting mobile malware threats to homeland security through static analysis.
J. Netw. Comput. Appl., 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014

Guest editorial: Information reuse, integration, and reusable systems.
Inf. Syst. Frontiers, 2014

Privacy-Preserving Assessment of Social Network Data Trustworthiness.
Int. J. Cooperative Inf. Syst., 2014

Randomized and Efficient Authentication in Mobile Environments.
IACR Cryptol. ePrint Arch., 2014

Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013.
EAI Endorsed Trans. Collab. Comput., 2014

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases.
CoRR, 2014

Security of new generation computing systems.
Concurr. Comput. Pract. Exp., 2014

Representation and querying of unfair evaluations in social rating systems.
Comput. Secur., 2014

A formal proximity model for RBAC systems.
Comput. Secur., 2014

Kinesis: a security incident response and prevention system for wireless sensor networks.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Fine-grained analysis of packet losses in wireless sensor networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provenance-aware security risk analysis for hosts and network flows.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Practical k nearest neighbor queries with location privacy.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms.
Proceedings of the Hybrid Artificial Intelligence Systems - 9th International Conference, 2014

Secure mutual proximity zone enclosure evaluation.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

ID-Based Two-Server Password-Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2014, 2014

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Data Trustworthiness - Approaches and Research Challenges.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Dynamic Privacy Policy Management in Services-Based Interactions.
Proceedings of the Database and Expert Systems Applications, 2014

Elite size and resilience impact on global system structuration in social media.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Security with Privacy - Opportunities and Challenges: Panel Position Paper.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Security with privacy - A research agenda.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Security of graph data: hashing schemes and definitions.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Demo Overview: Privacy-Enhancing Features of IdentiDroid.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Private Information Retrieval
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02337-8, 2013

RFID Security and Privacy
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02340-8, 2013

Security-Aware Service Composition with Fine-Grained Information Flow Control.
IEEE Trans. Serv. Comput., 2013

Single-Database Private Information Retrieval from Fully Homomorphic Encryption.
IEEE Trans. Knowl. Data Eng., 2013

Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

Privacy Preserving Policy-Based Content Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2013

A Similarity Measure for Comparing XACML Policies.
IEEE Trans. Knowl. Data Eng., 2013

Agent-based accountable grid computing systems.
J. Supercomput., 2013

A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IEEE Trans. Inf. Forensics Secur., 2013

Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Priv., 2013

Multi-route query processing and optimization.
J. Comput. Syst. Sci., 2013

Quality Control in Crowdsourcing Systems: Issues and Directions.
IEEE Internet Comput., 2013

Privacy-preserving authentication of trees and graphs.
Int. J. Inf. Sec., 2013

Collaboration in Multicloud Computing Environments: Framework and Security Issues.
Computer, 2013

Encryption key management for secure communication in smart advanced metering infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Fine-grained analysis of packet loss symptoms in wireless sensor networks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Data Security - Challenges and Research Opportunities.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Private data warehouse queries.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

A Comprehensive Access Control System for Scientific Applications.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy Preserving Context Aware Publish Subscribe Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013

Towards Authenticated Objects.
Proceedings of the Network and System Security - 7th International Conference, 2013

Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.
Proceedings of the Network and System Security - 7th International Conference, 2013

CRIS - Computational research infrastructure for science.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Multiparty privacy protection for electronic health records.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

PostgreSQL anomalous query detector.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient and accurate strategies for differentially-private sliding window queries.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient General Policy Decision by Using Mutable Variable Aware Cache.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Big Data - Opportunities and Challenges Panel Position Paper.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Preface.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

A file provenance system.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Adaptive data protection in distributed systems.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

An efficient certificateless cryptography scheme without pairing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

FENCE: continuous access control enforcement in dynamic data stream environments.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

A secure architecture design based on application isolation, code minimization and randomization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure and resilient proximity-based access control.
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013

Performance signatures of mobile phone browsers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Data quality evaluation: integrating security and accuracy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Collusion Detection in Online Rating Systems.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

Role-based access control to outsourced data in could computing.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

2012
Data Protection from Insider Threats
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01890-9, 2012

Special issue: best papers of VLDB 2010.
VLDB J., 2012

A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Secur. Comput., 2012

Privacy-Preserving Enforcement of Spatially Aware RBAC.
IEEE Trans. Dependable Secur. Comput., 2012

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
IEEE Trans. Dependable Secur. Comput., 2012

A Hybrid Approach to Private Record Matching.
IEEE Trans. Dependable Secur. Comput., 2012

Defending against insider threats and internal data leakage.
Secur. Commun. Networks, 2012

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012

A role-involved purpose-based access control model.
Inf. Syst. Frontiers, 2012

On Hashing Graphs.
IACR Cryptol. ePrint Arch., 2012

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
IACR Cryptol. ePrint Arch., 2012

Using automated individual white-list to protect web digital identities.
Expert Syst. Appl., 2012

Privacy-Preserving Fine-Grained Access Control in Public Clouds.
IEEE Data Eng. Bull., 2012

An Analytic Approach to People Evaluation in Crowdsourcing Systems
CoRR, 2012

Detecting, Representing and Querying Collusion in Online Rating Systems
CoRR, 2012

Cryptographic Key Management for Smart Power Grids - Approaches and Issues
CoRR, 2012

Preserving privacy of feedback providers in decentralized reputation systems.
Comput. Secur., 2012

On XACML's Adequacy to Specify and to Enforce HIPAA.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Modeling the Risk & Utility of Information Sharing in Social Networks.
Proceedings of the 2012 International Conference on Privacy, 2012

Authenticated Top-K Aggregation in Distributed and Outsourced Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Efficient privacy preserving content based publish subscribe systems.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Emerging trends around big data analytics and security: panel.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Secure sensor network SUM aggregation with detection of malicious nodes.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Privacy preserving delegated access control in the storage as a service model.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Panel: Using information re-use and integration principles in big data.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

A Comprehensive Model for Provenance.
Proceedings of the Advances in Conceptual Modeling, 2012

Towards a theory for privacy preserving distributed OLAP.
Proceedings of the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, 2012, 2012

Reputation management in crowdsourcing systems.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

On practical specification and enforcement of obligations.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Leakage-free redactable signatures.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Adaptive data management for self-protecting objects in cloud computing systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Demonstrating a lightweight data provenance for sensor networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Marlin: making it harder to fish for gadgets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
ACConv - An Access Control Model for Conversational Web Services.
ACM Trans. Web, 2011

Design and Implementation of an Intrusion Response System for Relational Databases.
IEEE Trans. Knowl. Data Eng., 2011

Privacy-Preserving Updates to Anonymous and Confidential Databases.
IEEE Trans. Dependable Secur. Comput., 2011

On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
IEEE Trans. Dependable Secur. Comput., 2011

Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications.
IEEE Pervasive Comput., 2011

A Conditional Role-Involved Purpose-Based Access Control Model.
J. Organ. Comput. Electron. Commer., 2011

DECHO - a framework for the digital exploration of cultural heritage objects.
ACM Journal on Computing and Cultural Heritage, 2011

Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach.
J. Comput. Syst. Sci., 2011

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011

Access Control for Databases: Concepts and Systems.
Found. Trends Databases, 2011

A conditional purpose-based access control model with dynamic roles.
Expert Syst. Appl., 2011

Trust establishment in the formation of Virtual Organizations.
Comput. Stand. Interfaces, 2011

Fine-grained integration of access control policies.
Comput. Secur., 2011

Efficient systematic clustering method for <i>k</i>-anonymization.
Acta Informatica, 2011

Private searching for single and conjunctive keywords on streaming data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

xfACL: an extensible functional language for access control.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Profile-Based Selection of Accountability Policies in Grid Computing Systems.
Proceedings of the POLICY 2011, 2011

Protecting information systems from insider threats - concepts and issues.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Aggregated Privacy-Preserving Identity Verification for Composite Web Services.
Proceedings of the IEEE International Conference on Web Services, 2011

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

A New Class of Buffer Overflow Attacks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A New Approach to Weighted Multi-Secret Sharing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Prox-RBAC: a proximity-based spatially aware RBAC.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Privacy-preserving assessment of location data trustworthiness.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Location-based access control systems for mobile users: concepts and research directions.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

Secure cryptographic key management system (CKMS) considerations for smart grid devices.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards privacy preserving access control in the cloud.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: towards attribute based group key management.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

PUF ROKs: a hardware approach to read-once keys.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

2010
A General Framework for Web Content Filtering.
World Wide Web, 2010

Multifactor Identity Verification Using Aggregated Proof of Knowledge.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Privacy-aware role-based access control.
ACM Trans. Inf. Syst. Secur., 2010

Mining Roles with Multiple Objectives.
ACM Trans. Inf. Syst. Secur., 2010

The PROBE Framework for the Personalized Cloaking of Private Locations.
Trans. Data Priv., 2010

Guest Editors' Introduction: Data Quality in the Internet Era.
IEEE Internet Comput., 2010

EXAM: a comprehensive environment for the analysis of access control policies.
Int. J. Inf. Sec., 2010

Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Mask: a system for privacy-preserving policy-based access to published content.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Assuring Data Trustworthiness - Concepts and Research Challenges.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Enforcing spatial constraints for mobile RBAC systems.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

A secure multiparty computation privacy preserving OLAP framework over distributed XML data.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Privilege States Based Access Control for Fine-Grained Intrusion Response.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Efficient privacy preserving reputation protocols inspired by secure sum.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

JTAM - A Joint Threshold Administration Model.
Proceedings of the POLICY 2010, 2010

Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

A Role-Involved Conditional Purpose-Based Access Control Model.
Proceedings of the E-Government, E-Services and Global Processes, 2010

Efficient and privacy-preserving enforcement of attribute-based access control.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Biometrics-based identifiers for digital identity management.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Policy-Driven Service Composition with Information Flow Control.
Proceedings of the IEEE International Conference on Web Services, 2010

A privacy-preserving approach to policy-based content dissemination.
Proceedings of the 26th International Conference on Data Engineering, 2010

Credibility-enhanced curated database: Improving the value of curated databases.
Proceedings of the 26th International Conference on Data Engineering, 2010

PEAR: a hardware based protocol authentication system.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

Privacy-preserving matching of spatial datasets with protection against background knowledge.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Analyzing semantic locations cloaking techniques in a probabilistic grid-based map.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

How to authenticate graphs without leaking.
Proceedings of the EDBT 2010, 2010

Private record matching using differential privacy.
Proceedings of the EDBT 2010, 2010

Provenance-based trustworthiness assessment in sensor networks.
Proceedings of the 7th Workshop on Data Management for Sensor Networks, 2010

Privacy preserving identity attribute verification in windows cardspace.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Privacy-preserving similarity measurement for access control policies.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Publishing Time-Series Data under Preservation of Privacy and Distance Orders.
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010

A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

Vulnerabilities leading to denial of services attacks in grid computing systems: a survey.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

PUF ROKs: generating read-once keys from physically unclonable functions.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Digital identity enrolment and assurance support for VeryIDX.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A policy-based approach for assuring data integrity in DBMSs.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Controlling data disclosure in computational PIR protocols.
Proceedings of the 5th ACM Symposium on Information, 2010

Risk-based access control systems built on fuzzy inferences.
Proceedings of the 5th ACM Symposium on Information, 2010

Systematic clustering method for <i>l</i>-diversity model.
Proceedings of the Database Technologies 2010, 2010

Security for Web Services and Service-Oriented Architectures.
Springer, ISBN: 978-3-540-87741-7, 2010

2009
Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems.
IEEE Trans. Serv. Comput., 2009

Efficient integration of fine-grained access control and resource brokering in grid.
J. Supercomput., 2009

Security Analysis of the SASI Protocol.
IEEE Trans. Dependable Secur. Comput., 2009

Location Privacy in Moving-Object Environments.
Trans. Data Priv., 2009

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.
Trans. Data Priv., 2009

Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS.
Trans. Data Priv., 2009

Privacy-preserving techniques for location-based services.
ACM SIGSPATIAL Special, 2009

A risk management approach to RBAC.
Risk Decis. Anal., 2009

Query Mesh: Multi-Route Query Processing Technology.
Proc. VLDB Endow., 2009

Tagging Stream Data for Rich Real-Time Services.
Proc. VLDB Endow., 2009

TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
Proc. VLDB Endow., 2009

A distributed approach to enabling privacy-preserving model-based classifier training.
Knowl. Inf. Syst., 2009

Security for Web Services: Standards and Research Issues.
Int. J. Web Serv. Res., 2009

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw., 2009

Privacy-preserving incremental data dissemination.
J. Comput. Secur., 2009

Specification and enforcement of flexible security policy for active cooperation.
Inf. Sci., 2009

A comprehensive simulation tool for the analysis of password policies.
Int. J. Inf. Sec., 2009

Privacy-Aware Role-Based Access Control.
IEEE Secur. Priv., 2009

Policy framework for security and privacy management.
IBM J. Res. Dev., 2009

Analysis of privacy and security policies.
IBM J. Res. Dev., 2009

Privacy-preserving Digital Identity Management for Cloud Computing.
IEEE Data Eng. Bull., 2009

An Interoperable Approach to Multifactor Identity Verification.
Computer, 2009

L'Elimination de la subjectivité dans la recommandation de confiance.
Proceedings of the Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, 2009

A Hybrid Technique for Private Location-Based Queries with Database Protection.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Adaptive Management of Multigranular Spatio-Temporal Object Attributes.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Effective and efficient implementation of an information flow control protocol for service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Assured information sharing: concepts and issues.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

<i>StreamShield</i>: a stream-centric approach towards security and privacy in data stream environments.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

An algebra for fine-grained integration of XACML policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Automating role-based provisioning by learning from examples.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Access control policy combining: theory meets practice.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Supporting RBAC with XACML+OWL.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Visualization for Access Control Policy Analysis Results Using Multi-level Grids.
Proceedings of the POLICY 2009, 2009

VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices.
Proceedings of the MDM 2009, 2009

Interactive Location Cloaking with the PROBE Obfuscator.
Proceedings of the MDM 2009, 2009

A Characterization of the problem of secure provenance management.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


TIUPAM: A Framework for Trustworthiness-Centric Information Sharing.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Elimination of Subjectivity from Trust Recommendation.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Context-Dependent Authentication and Access Control.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Privacy-preserving management of transactions' receipts for mobile environments.
Proceedings of the IDtrust 2009, 2009

The SCIFC Model for Information Flow Control in Web Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2009

Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

Privacy Preserving OLAP over Distributed XML Documents.
Proceedings of the ICPPW 2009, 2009

Multi-granular Spatio-temporal Object Models: Concepts and Research Directions.
Proceedings of the Object Databases, Second International Conference, 2009

A Comprehensive Approach for Solving Policy Heterogeneity.
Proceedings of the ICEIS 2009, 2009

Using Anonymized Data for Classification.
Proceedings of the 25th International Conference on Data Engineering, 2009

The Design and Evaluation of Accountable Grid Computing System.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Towards location-based access control in healthcare emergency response.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Can an inter-disciplinary research community on location privacy be successful?
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Research issues in data provenance for streaming environments.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Preventing velocity-based linkage attacks in location-aware applications.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Protecting location privacy against spatial inferences: the PROBE approach.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Assessing the trustworthiness of location data based on provenance.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Self-tuning query mesh for adaptive multi-route query processing.
Proceedings of the EDBT 2009, 2009

Information Services: Myth or Silver Bullet?
Proceedings of the Database Systems for Advanced Applications, 2009

The Challenge of Assuring Data Trustworthiness.
Proceedings of the Database Systems for Advanced Applications, 2009

An assessment of accountability policies for large-scale distributed computing systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Aggregating uncertain access risk estimations from different sources invited paper.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

D-algebra for composing access control policy decisions.
Proceedings of the 2009 ACM Symposium on Information, 2009

Physically restricted authentication with trusted hardware.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Location-Aware Authentication and Access Control.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Improving Scalability of Software Cloud for Composite Web Services.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

2008
A Survey of Quantification of Privacy Preserving Data Mining Algorithms.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Object-Oriented Databases.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Detecting anomalous access patterns in relational databases.
VLDB J., 2008

A New Model for Secure Dissemination of XML Content.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Anonymous Geo-Forwarding in MANETs through Location Cloaking.
IEEE Trans. Parallel Distributed Syst., 2008

Secure Collaboration in a Mediator-Free Distributed Environment.
IEEE Trans. Parallel Distributed Syst., 2008

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries.
IEEE Trans. Parallel Distributed Syst., 2008

Watermarking Relational Databases Using Optimization-Based Techniques.
IEEE Trans. Knowl. Data Eng., 2008

XACML Policy Integration Algorithms.
ACM Trans. Inf. Syst. Secur., 2008

Formal foundations for hybrid hierarchies in GTRBAC.
ACM Trans. Inf. Syst. Secur., 2008

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
IEEE Trans. Dependable Secur. Comput., 2008

Structural signatures for tree data structures.
Proc. VLDB Endow., 2008

An Access-Control Framework for WS-BPEL.
Int. J. Web Serv. Res., 2008

Spatial Domains for the Administration of Location-based Access Control Policies.
J. Netw. Syst. Manag., 2008

Measuring the structural similarity among XML documents and DTDs.
J. Intell. Inf. Syst., 2008

Semantics-aware Obfuscation for Location Privacy.
J. Comput. Sci. Eng., 2008

Cryptanalysis of Some RFID Authentication Protocols.
J. Commun., 2008

Context-Aware Adaptation of Access-Control Policies.
IEEE Internet Comput., 2008

Policy Mapper: Administering Location-Based Access-Control Policies.
IEEE Internet Comput., 2008

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

Responding to Anomalous Database Requests.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

An Approach to Evaluate Data Trustworthiness Based on Data Provenance.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

An obligation model bridging access control policies and privacy policies.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Mining roles with semantic meanings.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Policy decomposition for collaborative access control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Database Intrusion Detection and Response.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

EXAM: An Environment for Access Control Policy Analysis and Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Multi-domain and privacy-aware role based access control in eHealth.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Proactive Role Discovery in Mediator-Free Environments.
Proceedings of the Proceedings P2P'08, 2008

Privacy-Preserving Accountable Accuracy Management Systems (PAAMS).
Proceedings of the Protecting Persons While Protecting the People, 2008

Cryptanalysis of the LCSS RFID Authentication Protocol.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Protecting Location Privacy through Semantics-aware Obfuscation Techniques.
Proceedings of the Trust Management II, 2008

Authorization and User Failure Resiliency for WS-BPEL Business Processes.
Proceedings of the Service-Oriented Computing, 2008

Continuous Intersection Joins Over Moving Objects.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privately Updating Suppression and Generalization based k-Anonymous Databases.
Proceedings of the 24th International Conference on Data Engineering, 2008

Protecting Databases from Query Flood Attacks.
Proceedings of the 24th International Conference on Data Engineering, 2008

A Security Punctuation Framework for Enforcing Access Control on Streaming Data.
Proceedings of the 24th International Conference on Data Engineering, 2008

Secure Delta-Publishing of XML Content.
Proceedings of the 24th International Conference on Data Engineering, 2008

A Hybrid Approach to Private Record Linkage.
Proceedings of the 24th International Conference on Data Engineering, 2008

Position transformation: a location privacy protection method for moving objects.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Multigranular spatio-temporal models: implementation challenges.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

Security and privacy for geospatial data: concepts and research directions.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Approach to Supporting Continuity of Usage in Location-Based Access Control.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Minimal credential disclosure in trust negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Querying Multigranular Spatio-temporal Objects.
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008

End-to-end accountability in grid computing systems for coalition information sharing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

A Federated Digital Identity Management Approach for Business Processes.
Proceedings of the Collaborative Computing: Networking, 2008

High-Assurance Integrity Techniques for Databases.
Proceedings of the Sharing Data, 2008

A Policy-Based Accountability Tool for Grid Computing Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.
Proceedings of the The Third International Conference on Availability, 2008

2007
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

GEO-RBAC: A spatially aware RBAC.
ACM Trans. Inf. Syst. Secur., 2007

An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2007

Privacy preserving multi-factor authentication with biometrics.
J. Comput. Secur., 2007

A dynamic key management solution to access hierarchy.
Int. J. Netw. Manag., 2007

A system for securing push-based distribution of XML documents.
Int. J. Inf. Sec., 2007

Data security in location-aware applications: an approach based on RBAC.
Int. J. Inf. Comput. Secur., 2007

A Critique of the ANSI Standard on Role-Based Access Control.
IEEE Secur. Priv., 2007

Trust Negotiation in Identity Management.
IEEE Secur. Priv., 2007

Modeling and language support for the management of pattern-bases.
Data Knowl. Eng., 2007

Replacing Lost or Stolen E-Passports.
Computer, 2007

An integrated approach to federated identity and privilege management in open systems.
Commun. ACM, 2007

A roadmap for comprehensive online privacy policy management.
Commun. ACM, 2007

Information carrying identity proof trees.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Challenges of Testing Web Services and Security in SOA Implementations.
Proceedings of the Test and Analysis of Web Services, 2007

Privacy preserving schema and data matching.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

A privacy preserving assertion based policy language for federation systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Privacy-aware role based access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

An approach to evaluate policy similarity.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Decentralized authorization and data security in web content delivery.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

XACML Function Annotations.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Service-oriented Approach to Security - Concepts and Issues.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

Profiling Database Application to Detect SQL Injection Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

User Tasks and Access Control overWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Privacy Requirements in Identity Management Solutions.
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007

Access Control Strategies for Virtualized Environments in Grid Computing Systems.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

Conditional Privacy-Aware Role Based Access Control.
Proceedings of the Computer Security, 2007

Password policy simulation and analysis.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Receipt management- transaction history based trust establishment.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Data Management in RFID Applications.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Efficient <i>k</i> -Anonymization Using Clustering Techniques.
Proceedings of the Advances in Databases: Concepts, 2007

A structure preserving approach for securing XML documents.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Access Control Systems for Geospatial Data and Applications.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

Database Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Ws-AC: A Fine Grained Access Control System for Web Services.
World Wide Web, 2006

Secure knowledge management: confidentiality, trust, and privacy.
IEEE Trans. Syst. Man Cybern. Part A, 2006

X-FEDERATE: A Policy Engineering Framework for Federated Access Management.
IEEE Trans. Software Eng., 2006

Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems.
ACM Trans. Inf. Syst. Secur., 2006

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2006

Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges.
SIGMOD Rec., 2006

An Adaptive Access Control Model for Web Services.
Int. J. Web Serv. Res., 2006

Establishing and protecting digital identity in federation systems.
J. Comput. Secur., 2006

Policies and IT Technologies: A Puzzle of Two Pieces.
IEEE Internet Comput., 2006

A secure framework for publishing virtual community contracts.
Int. J. Web Based Communities, 2006

Workflow authorisation in mediator-free environments.
Int. J. Secur. Networks, 2006

Integration of virtual reality and database systems for cultural heritage dissemination.
Int. J. Comput. Sci. Eng., 2006

A multigranular object-oriented framework supporting spatio-temporal granularity conversions.
Int. J. Geogr. Inf. Sci., 2006

A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy).
Comput. Geosci., 2006

Foreword.
Ann. des Télécommunications, 2006

Access control enforcement for conversation-based web services.
Proceedings of the 15th international conference on World Wide Web, 2006

Towards a contextualized access to the cultural heritage world using 360 Panoramic Images.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Secure Anonymization for Incremental Datasets.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Access control, confidentiality and privacy for video surveillance databases.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Fine-grained role-based delegation in presence of the hybrid role hierarchy.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Systematic control and management of data integrity.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Architectural issues for a location-aware role-based access control system.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Digital identity management and protection.
Proceedings of the 2006 International Conference on Privacy, 2006

Beyond <i>k</i>-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.
Proceedings of the Privacy in Statistical Databases, 2006

Policy Languages for Digital Identity Management in Federation Systems.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Preserving User Location Privacy in Mobile Data Management Infrastructures.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Extended RBAC with Role Attributes.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Access Control and Privacy in Location-Aware Services forMobile Organizations.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Access Control and Authorization Constraints for WS-BPEL.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Private Updates to Anonymous Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Secure Dissemination of XML Content Using Structure-based Routing.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

Privacy preserving multi-factor authentication with biometrics.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the 10th International Conference on CSCW in Design, 2006

A semantic approach to build personalized interfaces in the cultural heritage domain.
Proceedings of the working conference on Advanced visual interfaces, 2006

Security in SOA and Web Services.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
Secure Interoperation in a Multidomain Environment Employing RBAC Policies.
IEEE Trans. Knowl. Data Eng., 2005

A Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Knowl. Data Eng., 2005

X-gtrbac admin: A decentralized administration model for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005

X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005

An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Dependable Secur. Comput., 2005

Database Security-Concepts, Approaches, and Challenges.
IEEE Trans. Dependable Secur. Comput., 2005

The Indiana Center for Database Systems at Purdue University.
SIGMOD Rec., 2005

An apples-to-apples comparison of two database journals.
SIGMOD Rec., 2005

Towards structure discovering in video data.
J. Exp. Theor. Artif. Intell., 2005

An approach to cooperative updates of XML documents in distributed systems.
J. Comput. Secur., 2005

A Trust-Based Context-Aware Access Control Model for Web-Services.
Distributed Parallel Databases, 2005

A Framework for Evaluating Privacy Preserving Data Mining Algorithms.
Data Min. Knowl. Discov., 2005

Reasoning about RDF statements with default rules.
Proceedings of the W3C Workshop on Rule Languages for Interoperability, 2005

Efficient hierarchical key generation and key diffusion for sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

SERAT: SEcure role mApping technique for decentralized secure interoperability.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Purpose based access control of complex data for privacy protection.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

PDL with Preferences.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study.
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005

Spatial Knowledge-Based Applications and Technologies: Research Issues.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Integrated Approach to Rating and Filtering Web Content.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

P-Hera: Scalable fine-grained access control for P2P infrastructures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Assuring Security Properties in Third-party Architectures.
Proceedings of the 21st International Conference on Data Engineering, 2005

Privacy and Ownership Preserving of Outsourced Medical Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

An Update Protocol for XML Documents in Distributed and Cooperative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Privacy-Preserving Database Systems.
Proceedings of the Foundations of Security Analysis and Design III, 2005

Integration of Virtual Reality and Database System Techniques.
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005

Access control management in a distributed environment supporting dynamic collaboration.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

A Multi-Strategy Approach to Rating and Filtering Online Resources.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Information Driven Evaluation of Data Hiding Algorithms.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

Purpose Based Access Control for Privacy Protection in Database Systems.
Proceedings of the Database Systems for Advanced Applications, 2005

A novel approach for privacy-preserving video sharing.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Securing XML data in third-party distribution systems.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Secure collaboration in mediator-free environments.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

Intrusion Detection in RBAC-administered Databases.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Efficient Integration of Fine-grained Access Control in Large-scale Grid Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Information Security.
Proceedings of the Practical Handbook of Internet Computing., 2004

Guest Editors' Introduction.
World Wide Web, 2004

Association Rule Hiding.
IEEE Trans. Knowl. Data Eng., 2004

Extending the ODMG Object Model with Triggers.
IEEE Trans. Knowl. Data Eng., 2004

Trust-X: A Peer-to-Peer Framework for Trust Establishment.
IEEE Trans. Knowl. Data Eng., 2004

Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

State-of-the-art in privacy preserving data mining.
SIGMOD Rec., 2004

CiVeDi: A Customized Virtual Environment for Database Interaction.
SIGMOD Rec., 2004

A Logical Approach to Quality of Service Specification in Video Databases.
Multim. Tools Appl., 2004

Handling Expiration of Multigranular Temporal Objects.
J. Log. Comput., 2004

Merkle Tree Authentication in UDDI Registries.
Int. J. Web Serv. Res., 2004

Access control for XML documents and data.
Inf. Secur. Tech. Rep., 2004

A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications.
Inf. Syst., 2004

Access-Control Language for Multidomain Environments.
IEEE Internet Comput., 2004

Guest Editors' Introduction: Data Dissemination on the Web.
IEEE Internet Comput., 2004

Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations.
Int. J. Softw. Eng. Knowl. Eng., 2004

Trust negotiations: concepts, systems, and languages.
Comput. Sci. Eng., 2004

XML-Based Specification for Web Services Document Security.
Computer, 2004

A Policy Framework for Access Management in Federated Information Sharing.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Modeling and Language Support for the Management of Pattern-Bases.
Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 2004

Exploiting User-Profiles for the Selective Dissemination of XML Documents.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004

X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Security for grid-based computing systems issues and challenges.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

An Access Control System for a Web Map Management Service.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

A Framework for Contractual Resource Sharing in Coalitions.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

A Framework for Data Mining Pattern Management.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

Privacy-Preserving Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Towards a Language for Pattern Manipulation and Querying.
Proceedings of the Intl. Workshop on Pattern Representation and Management, 2004

Securing DBMS: Characterizing and Detecting Query Floods.
Proceedings of the Information Security, 7th International Conference, 2004

An XML-Based Approach to Document Flow Verification.
Proceedings of the Information Security, 7th International Conference, 2004

Flow policies: specification and enforcement.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

A Trigger-Based Approach for Communication Personalization.
Proceedings of the 8th International Database Engineering and Applications Symposium (IDEAS 2004), 2004

XJoin Index: Indexing XML Data for Efficient Handling of Branching Path Expressions.
Proceedings of the 20th International Conference on Data Engineering, 2004

Grid based methods for estimating spatial join selectivity.
Proceedings of the 12th ACM International Workshop on Geographic Information Systems, 2004

An authorization model for geographical maps.
Proceedings of the 12th ACM International Workshop on Geographic Information Systems, 2004

Towards Supporting Fine-Grained Access Control for Grid Resources.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

A Flexible Access Control Model for Web Services.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

Access to Multigranular Temporal Objects.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

DiXeminator: A Profile-Based Selective Dissemination System for XML Documents.
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
Proceedings of the Digital Library Architectures: Peer-to-Peer, 2004

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.
Proceedings of the Communications and Multimedia Security, 2004

Purpose based access control for privacy protection.
Proceedings of the 20èmes Journées Bases de Données Avancées, 2004

A Fine-Grained Access Control Model for Web Services.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Retrieval of Semistructured Web Data.
Proceedings of the Intelligent Exploration of the Web, 2003

Introducing Dynamic Behavior in Amalgamated Knowledge Bases.
Theory Pract. Log. Program., 2003

A hierarchical access control model for video database systems.
ACM Trans. Inf. Syst., 2003

Static Analysis of Logical Languages with Deferred Update Semantics.
IEEE Trans. Knowl. Data Eng., 2003

A logical framework for reasoning about access control models.
ACM Trans. Inf. Syst. Secur., 2003

A Database Approach to Quality of Service Specification in Video Databases.
SIGMOD Rec., 2003

Ordering and Path Constraints over Semistructured Data.
J. Intell. Inf. Syst., 2003

Refined rules termination analysis through transactions.
Inf. Syst., 2003

T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management.
Inf. Syst., 2003

Content-based filtering of Web documents: the MaX system and the EUFORBIA project.
Int. J. Inf. Sec., 2003

Quality of Service Specification in Video Databases.
IEEE Multim., 2003

Hierarchical data placement for navigational multimedia applications.
Data Knowl. Eng., 2003

A set-oriented method definition language for object databases and its semantics.
Concurr. Comput. Pract. Exp., 2003

RBAC models - concepts and trends.
Comput. Secur., 2003

Trustworthy objects.
Obj. Logiciel Base données Réseaux, 2003

ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage.
Proceedings of the SIGGRAPH 2003 Conference on Sketches & Applications: in conjunction with the 30th annual conference on Computer graphics and interactive techniques, 2003

Memorizzazione di regole per l'instradamento di messaggi in un sistema di comunicazione universale.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

Grid Based Methods for the Spatial Join Estimation.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

Dependencies and separation of duty constraints in GTRBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

An infrastructure for managing secure update operations on XML data.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

X-TNL: An XML-based Language for Trust Negotiations.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

PDL with Maximum Consistency Monitors.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

An abstraction-based approach to measuring the structural similarity between two unordered XML documents.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

A multigranular spatiotemporal data model.
Proceedings of the ACM-GIS 2003, 2003

A reference framework for integrating multiple representations of geographical maps.
Proceedings of the ACM-GIS 2003, 2003

Signature and Access Control Policies for XML Documents.
Proceedings of the Computer Security, 2003


Author-Chi - A System for Secure Dissemination and Update of XML Documents.
Proceedings of the Databases in Networked Information Systems, 2003

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Supporting Delegation in Secure Workflow Management Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

PC Co-chairs' Message.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003

Trust-Chi: An XML Framework for Trust Negotiations.
Proceedings of the Communications and Multimedia Security, 2003

Local Closed-World Assumptions for reasoning about Semantic Web data.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003

User Preferences VS Minimality in PPDL.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003

2002
An authorization system for digital libraries.
VLDB J., 2002

A Content-Based Authorization Model for Digital Libraries.
IEEE Trans. Knowl. Data Eng., 2002

Secure and selective dissemination of XML documents.
ACM Trans. Inf. Syst. Secur., 2002

A Knowledge-Based Approach to Visual Information.
J. Intell. Inf. Syst., 2002

Guest Editors' Introduction: Database Technology on the Web.
IEEE Internet Comput., 2002

IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web.
IEEE Distributed Syst. Online, 2002

Workflow Architecture for Interactive Video Management Systems.
Distributed Parallel Databases, 2002

Protection and administration of XML data sources.
Data Knowl. Eng., 2002

Using spatial data access structures for filtering nearest neighbor queries.
Data Knowl. Eng., 2002

Evolution Specification of Multigranular Temporal Objects.
Proceedings of the 9th International Symposium on Temporal Representation and Reasoning, 2002

Temporal hierarchies and inheritance semantics for GTRBAC.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Making access control more usable.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

A System to Specify and Manage Multipolicy Access Control Models.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

Matching an XML Document against a Set of DTDs.
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002

Rules Termination Analysis investigating the interaction between transactions and triggers.
Proceedings of the International Database Engineering & Applications Symposium, 2002

An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002

Evolving a Set of DTDs According to a Dynamic Set of XML Documents.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

Distributed Cooperative Updates of XML Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Ma X : An Access Control System for Digital Libraries and the Web.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

A temporal key management scheme for secure broadcasting of XML documents.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Enhancing the expressive power of the U-Datalog language.
Theory Pract. Log. Program., 2001

Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'.
IEEE Trans. Knowl. Data Eng., 2001

A nested transaction model for multilevel secure database management systems.
ACM Trans. Inf. Syst. Secur., 2001

TRBAC: A temporal role-based access control model.
ACM Trans. Inf. Syst. Secur., 2001

Quality of Service in Multimedia Digital Libraries.
SIGMOD Rec., 2001

XML security.
Inf. Secur. Tech. Rep., 2001

Role Based Access Control Models.
Inf. Secur. Tech. Rep., 2001

XML and Data Integration.
IEEE Internet Comput., 2001

Securing XML Documents with Author-X.
IEEE Internet Comput., 2001

Integrating XML and Databases.
IEEE Internet Comput., 2001

Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries.
Fundam. Informaticae, 2001

Directions for Web and E-Commerce Applications Security.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Navigating Through Multiple Temporal Granularity Objects.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

A Linguistic Framework for Querying Dimensional Data.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

Securing XML Documents: the Author-X Project Demonstration.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

On specifying security policies for web documents with an XML-based language.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

An Access Control Mechanism for Large Scale Data Dissemination Systems.
Proceedings of the Eleventh International Workshop on Research Issues in Data Engineering: Document Management for Data Intensive Business and Scientific Applications, 2001

A Secure Publishing Service for Digital Libraries of XML Documents.
Proceedings of the Information Security, 4th International Conference, 2001

Hiding Association Rules by Using Confidence and Support.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Introducing Cooperation and Actions in Amalgamated Knowledge Bases.
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001

Intelligent Database Systems
Addison-Wesley, ISBN: 0-201-87736-8, 2001

2000
Specifying and enforcing access control policies for XML document sources.
World Wide Web, 2000

ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Guest Editorial: Introduction to the Special Section.
IEEE Trans. Knowl. Data Eng., 2000

Guest Editorial: Introduction to the Special Section.
IEEE Trans. Knowl. Data Eng., 2000

Trigger Inheritance and Overriding in an Active Object Database System.
IEEE Trans. Knowl. Data Eng., 2000

MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations.
IEEE Trans. Knowl. Data Eng., 2000

An index allocation tool for object-oriented database systems.
Softw. Pract. Exp., 2000

A Logical Approach to Cooperative Information Systems.
J. Log. Program., 2000

Temporal Authorization Bases: From Specification to Integration.
J. Comput. Secur., 2000

A Logic-Based Approach for Enforcing Access Control.
J. Comput. Secur., 2000

A Semantic-Based Execution Model for Multilevel Secure Workflows.
J. Comput. Secur., 2000

Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels.
ACM SIGMOD Digit. Rev., 2000

Review - Role Hierarchies and Constraints for Lattice-Based Access Controls.
ACM SIGMOD Digit. Rev., 2000

Review - Data Mining: An Overview from a Database Perspective.
ACM SIGMOD Digit. Rev., 2000

Review - Supporting Valid-Time Indeterminacy.
ACM SIGMOD Digit. Rev., 2000

Flexible Transaction Dependencies in Database Systems.
Distributed Parallel Databases, 2000

Protecting information on the Web.
Commun. ACM, 2000

Triggers in Java-based Databases.
Obj. Logiciel Base données Réseaux, 2000

Querying Multiple Temporal Granularity Data.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

A Semi-automatic System for Conceptual Annotation, its Application to Resource Construction and Evaluation.
Proceedings of the Second International Conference on Language Resources and Evaluation, 2000

Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries.
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000

Fuzzy and Presentation Algebras for Web and Multimedia Data.
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000

Exception Handling in Object-Oriented Databases.
Proceedings of the Advances in Exception Handling Techniques (the book grow out of a ECOOP 2000 workshop), 2000

Author-X: A Java-Based System for XML Data Protection.
Proceedings of the Data and Application Security, 2000

Protecting XML Documents: Position Paper.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

An Access Control Model for Video Database Systems.
Proceedings of the 2000 ACM CIKM International Conference on Information and Knowledge Management, 2000

1999
A Flexible Authorization Mechanism for Relational Data Management Systems.
ACM Trans. Inf. Syst., 1999

The Indispensability of Dispensable Indexes.
IEEE Trans. Knowl. Data Eng., 1999

The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999

Object-Oriented Databases and Applications - Selected Papers from ICDE'98.
Theory Pract. Object Syst., 1999

Secure Object Deletion and Garbage Collection in Multilevel Object Bases.
J. Comput. Secur., 1999

Finitely Representable Nested Relations.
Inf. Process. Lett., 1999

Review - An Authorization Mechanism for a Relational Data Base System.
ACM SIGMOD Digit. Rev., 1999

Modeling Spatio-Temporal Constraints for Multimedia Objects.
Data Knowl. Eng., 1999

Controlled Access and Dissemination of XML Documents.
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999

A Conceptual Annotation Approach to Indexing in a Web-Based Information System.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999

A Temporal Object-Oriented Data Model with Multiple Granularities.
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999

Applying Data Mining Techniques to Wafer Manufacturing.
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1999

CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents.
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999

CONCERTO, Conceptual Indexing, Querying and Retrieval of Digital Documents.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Indexing Constraint Databases by Using a Dual Representation.
Proceedings of the 15th International Conference on Data Engineering, 1999

Inheritance in a Deductive Object Database Language with Updates.
Proceedings of the Transactions and Database Dynamics, 1999

An Approach to Classify Semi-structured Objects.
Proceedings of the ECOOP'99, 1999

An adaptive concurrency control protocol for mobile transactions.
Proceedings of the Mobile Networks and Computing, 1999

Approximation Techniques for Indexing Two-Dimensional Constraint Databases.
Proceedings of the Database Systems for Advanced Applications, 1999

A Logical Framework for Reasoning on Data Access Control Policies.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

Protecting Information in the Web - Position Paper.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
ACM Trans. Database Syst., 1998

Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

Navigational Accesses in a Temporal Object Model.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Synchronization Models for Multimedia Data.
IEEE Trans. Knowl. Data Eng., 1998

An Extended Algebra for Constraint Databases.
IEEE Trans. Knowl. Data Eng., 1998

Exception-Based Information Flow Control in Object-Oriented Systems.
ACM Trans. Inf. Syst. Secur., 1998

Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
Theory Pract. Object Syst., 1998

A Constraint-Based Approach to Shape Management in Multimedia Databases.
Multim. Syst., 1998

A Formal Definition of the Chimera Object-Oriented Data Model.
J. Intell. Inf. Syst., 1998

Definition and Analysis of Index Organizations for Object-Oriented Database Systems.
Inf. Syst., 1998

Data Security.
Data Knowl. Eng., 1998

An Approach to Model and Query Event-Based Temporal Data.
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998

Extending the ODMG Object Model with Composite Objects.
Proceedings of the 1998 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1998

An Authorization Model and Its Formal Semantics.
Proceedings of the Computer Security, 1998

Towards Optimal Indexing for Segment Databases.
Proceedings of the Advances in Database Technology, 1998

Extending the ODMG Object Model with Time.
Proceedings of the ECOOP'98, 1998

Active-U-Datalog: Integrating Active Rules in a Logical Update Language.
Proceedings of the Transactions and Change in Logic Databases, 1998

Introducing External Functions in Constraint Query Languages.
Proceedings of the Principles and Practice of Constraint Programming, 1998

Data Security.
Proceedings of the COMPSAC '98, 1998

Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
Proceedings of the Application and Theory of Petri Nets 1998, 1998

1997
Information Flow Control in Object-Oriented Systems.
IEEE Trans. Knowl. Data Eng., 1997

Transactions and Updates in Deductive Databases.
IEEE Trans. Knowl. Data Eng., 1997

An Extended Authorization Model for Relational Databases.
IEEE Trans. Knowl. Data Eng., 1997

On Modeling Cost Functions for Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1997

Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997

A Formal View of Object-Oriented Database Systems.
Theory Pract. Object Syst., 1997

T_Chimera: A Temporal Object-Oriented Data Model.
Theory Pract. Object Syst., 1997

Decentralized Administration for a Temporal Access Control Model.
Inf. Syst., 1997

Towards Optimal Two-Dimensional Indexing for Constraint Databases.
Inf. Process. Lett., 1997

A theoretical formulation for degrees of isolation in databases.
Inf. Softw. Technol., 1997

Manipulating Spatial Data in Constraint Databases.
Proceedings of the Advances in Spatial Databases, 1997

Providing flexibility in information flow control for object oriented systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A Unified Framework for Enforcing Multiple Access Control Policies.
Proceedings of the SIGMOD 1997, 1997

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Trigger Inheritance and Overriding in Active Object Database Systems.
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997

Administration Policies in a Multipolicy Autorization System.
Proceedings of the Database Securty XI: Status and Prospects, 1997

A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Proceedings of the Database Securty XI: Status and Prospects, 1997

An Execution Model for Multilevel Seccure Workflows.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Integrity Constraint Checking in Chimera.
Proceedings of the Constraint Databases and Their Applications, 1997

Query Processing.
Proceedings of the Multimedia Databases in Perspective, 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997

Indexing Techniques for Advanced Database Systems
Advances in Database Systems 8, Kluwer, ISBN: 0-7923-9985-4, 1997

1996
An Authorization Model for a Distributed Hypertext System.
IEEE Trans. Knowl. Data Eng., 1996

A Temporal Access Control Mechanism for Database Systems.
IEEE Trans. Knowl. Data Eng., 1996

Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996

On the Number of Descendants in an Object DAG.
Inf. Process. Lett., 1996

Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996

On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996

Supporting Multiple Access Control Policies in Database Systems.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

A Formal Representation for State Diagrams in the OMT Methodology.
Proceedings of the SOFSEM '96: Theory and Practice of Informatics, 1996

Viewpoints in object database systems.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996

A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996

Static Analysis of Intensional Databases in U-Datalog.
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996

A Graph-Theoretic Approach to Indexing in Object-Oriented Databases.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

A Formal Temporal Object-Oriented Data Model.
Proceedings of the Advances in Database Technology, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996

A Non-Timestamped Authorization Model for Data Management Systems.
Proceedings of the CCS '96, 1996

A Data Access Structure for Filtering Distance Queries in Image Retrieval.
Proceedings of the Multimedia Database System: Issues and Research Direction, 1996

1995
Index Organizations for Object-Oriented Database Systems.
IEEE Trans. Knowl. Data Eng., 1995

Towards Deductice Object Databases.
Theory Pract. Object Syst., 1995

An Extended Authorization Model for Object Databases.
J. Comput. Secur., 1995

Database Security: Research and Practice
Inf. Syst., 1995

Semantic Assumptions and Query Evaluation in Temporal Databases.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

Query Decomposition in an Object-Oriented Database System Distributed on a Local Area Network.
Proceedings of the Proceedings RIDE-DOM '95, Fifth International Workshop on Research Issues in Data Engineering, 1995

Research issues in authorization models for hypertext systems.
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995

Database Monitoring in U-Datalog.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995

Objects with Multiple Most Specific Classes.
Proceedings of the ECOOP'95, 1995

Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995

Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

Enhanced Nested-Inherited Index for OODBMS.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases.
Proceedings of the Constraint Databases and Applications, 1995

1994
Index Configuration in Object-Oriented Databases
VLDB J., 1994

Guest Editors' Introduction.
Distributed Parallel Databases, 1994

Applications of Object-Oriented Technology to the Integration of Heterogeneous Database Systems.
Distributed Parallel Databases, 1994

An Approach to Authorization Modeling in Object-Oriented Database Systems.
Data Knowl. Eng., 1994

Clustering Techniques in Object Bases: A Survey.
Data Knowl. Eng., 1994

Index Configurations in Object-Oriented Databases.
Proceedings of the TOOLS 1994: 13th International Conference on Technology of Object-Oriented Languages and Systems, 1994

Collecting garbage in multilevel secure object stores.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Transaction Optimization in Rule Databases.
Proceedings of the Fourth International Workshop on Research Issues in Data Engineering: Active Database Systems, 1994

Generic Methods in Deductive Object Databases.
Proceedings of the 1994 International Conference on Object Oriented Information Systems, 1994

A discretionary access control model with temporal authorizations.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

On the Selection of Optimal Index Configuration in OO Databases.
Proceedings of the Tenth International Conference on Data Engineering, 1994

Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Proceedings of the Computer Security, 1994

Deductive Object Databases.
Proceedings of the Object-Oriented Programming, Proceedings of the 8th European Conference, 1994

Static Analysis of Transactional Intensional Databases.
Proceedings of the Workshop on Deductive Databases and Logic Programming, 1994

A new Authorization Model for Object-Oriented Databases.
Proceedings of the Database Security, 1994

Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994

A Temporal Authorization Model.
Proceedings of the CCS '94, 1994

A Bottom-Up Interpreter for a Database Language with Updates and Transactions.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
Access Control in Object-Oriented Database Systems - Some Approaches and Issues.
Proceedings of the Advanced Database Systems, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
J. Comput. Secur., 1993

Path-Index: An Approach to the Efficient Execution of Object-Oriented Queries.
Data Knowl. Eng., 1993

Achieving stricter correctness requirements in multilevel secure databases.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

An Advanced Information Management System.
Proceedings of the RIDE-IMS '93, 1993

Research Issues in Discretionary Authorizations for Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

Modeling Multilevel Entities Using Single Level Objects.
Proceedings of the Deductive and Object-Oriented Databases, Third International Conference, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993

Queries, Constraints, Updates and Transactions Within a Logic-Based Language.
Proceedings of the CIKM 93, 1993

High Assurance Discretionary Access Control for Object Bases.
Proceedings of the CCS '93, 1993

Authorizations in Relational Database Management Systems.
Proceedings of the CCS '93, 1993

Formalizzazione e Ottimizzazione di Transazioni di modifica in CLP(AD).
Proceedings of the 8th Italian Conference on Logic Programming, 1993

Object-Oriented Database Systems
Addison-Wesley, ISBN: 0-201-62439-7, 1993

1992
Object-Oriented Query Languages: The Notion and the Issues.
IEEE Trans. Knowl. Data Eng., 1992

Query optimization by using knowledge about data semantics.
Data Knowl. Eng., 1992

An Approach to Support Method Invocations in Object-Oriented Queries.
Proceedings of the RIDE-TQP '92, 1992

Optimization of Object-Oriented Queries Using Path Indices.
Proceedings of the RIDE-TQP '92, 1992

An Analytical Model of Object-Oriented Query Costs.
Proceedings of the Persistent Object Systems, 1992

A Knowledge Based Information System.
Proceedings of the Personal Computers and Intelligent Systems, 1992

Data Hiding and Security in Object-Oriented Databases.
Proceedings of the Eighth International Conference on Data Engineering, 1992

Multimedia Data Handling in a Knowledge Representation System.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992

The ADKMS Knowledge Acquisition System.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992

Modelling Database Updates with Constraint Logic Programming.
Proceedings of the Modelling Database Dynamics, 1992

CLP(AD) as a Deductive Database Language with Updates.
Proceedings of the Extensions of Logic Programming, Third International Workshop, 1992

Towards a Logical-Object Oriented Programming Language for Databases.
Proceedings of the Advances in Database Technology, 1992

A View Mechanism for Object-Oriented Databases.
Proceedings of the Advances in Database Technology, 1992

Modeling Database Updates with Constraint Logic Programming.
Proceedings of the Workshop on Deductive Databases held in conjunction with the Joint International Conference and Symposium on Logic Programming, 1992

CLP (X) as a framework for action and deduction.
Proceedings of the CNKBS'92, 1992

An Approach to Integrate Multimedi Data in a Knowledge Representation System.
Proceedings of the Advanced Visual Interfaces - Proceedings of the International Workshop, 1992

Sistemi di basi di dati orientate agli oggetti - concetti e architetture.
Addison-Wesley, ISBN: 978-88-7192-036-8, 1992

1991
A Model of Authorization for Next-Generation Database Systems.
ACM Trans. Database Syst., 1991

Object-Oriented Database Management Systems: Concepts and Issues.
Computer, 1991

Integration of Heterogeneous Data Repositories by Using Object-Oriented Views.
Proceedings of the RIDE-IMS '91, 1991

An Indexing Technique for Object-Oriented Databases.
Proceedings of the Seventh International Conference on Data Engineering, 1991

Method precomputation in object-oriented databases.
Proceedings of the Conference on Organizational Computing Systems, 1991

A Survey of Indexing Techniques for Object-Oriented Database Management Systems.
Proceedings of the Query Processing for Advanced Database Systems, 1991

1990
Optimization of Queries using Nested Indices.
Proceedings of the Advances in Database Technology, 1990

Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990

An object-oriented data model for distributed office applications.
Proceedings of the ACM SIGOIS and IEEE CS TC-OA Conference on Office Information Systems, 1990

1989
Indexing Techniques for Queries on Nested Objects.
IEEE Trans. Knowl. Data Eng., 1989

Integration of heterogeneous database applications through an object-oriented interface.
Inf. Syst., 1989

Composite Objects Revisted.
Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, Portland, Oregon, USA, May 31, 1989

1988
Query Processing in a Multimedia Document System.
ACM Trans. Inf. Syst., 1988

The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System.
Perform. Evaluation, 1988

Correctness of Semantic Integrity Checking in Database Management Systems.
Acta Informatica, 1988

The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications.
Proceedings of the Advances in Object-Oriented Database Systems, 1988

Document query processing strategies: cost evaluation and heuristics.
Proceedings of the ACM SIGOIS and IEEECS TC-OA 1988 Conference on Office Information Systems, 1988

MULTOS: a Document Server for Distributed Office Systems.
Proceedings of the Advances in Database Technology, 1988

Views and Security in Distributed Database Management Systems.
Proceedings of the Advances in Database Technology, 1988

1987
An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems.
Comput. J., 1987

1986
Query Processing Based on Complex Object Types.
IEEE Database Eng. Bull., 1986

1984
Development of a Multimedia Information System for an Office Environment.
Proceedings of the Tenth International Conference on Very Large Data Bases, 1984

1983
View Management in Distributed Data Base Systems.
Proceedings of the 9th International Conference on Very Large Data Bases, October 31, 1983

Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases.
Proceedings of the Third Symposium on Reliability in Distributed Software and Database Systems, 1983

The Update Problem in the Distributed Database System Hermes/1.
Proceedings of the Second International Conference On Databases, 1983

Distributed Database Design Using the Entity-Relationship Model.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

1982
R*: A Research Project on Distributed Relational DBMS.
IEEE Database Eng. Bull., 1982

1981
Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System.
Proceedings of the Trends in Information Processing Systems, 1981


  Loading...