Elisa Bertino

According to our database1, Elisa Bertino
  • authored at least 896 papers between 1981 and 2018.
  • has a "Dijkstra number"2 of three.

Awards

ACM Fellow

ACM Fellow 2003, "For contributions to secure database systems.".

IEEE Fellow

IEEE Fellow 2002, "For contributions to the theory of object-oriented databases, temporal databases, and database security.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Big Data Security and Privacy.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey.
Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery, 2017

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection.
IEEE Trans. Software Eng., 2017

Sensor Network Provenance Compression Using Dynamic Bayesian Networks.
TOSN, 2017

A System for Response and Prevention of Security Incidents in Wireless Sensor Networks.
TOSN, 2017

Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017

Pareto Optimal Security Resource Allocation for Internet of Things.
ACM Trans. Priv. Secur., 2017

Real-Time Digital Signatures for Time-Critical Networks.
IEEE Trans. Information Forensics and Security, 2017

A Collaborative DDoS Defence Framework Using Network Function Virtualization.
IEEE Trans. Information Forensics and Security, 2017

Editor's Note.
IEEE Trans. Dependable Sec. Comput., 2017

The State of the Journal Editorial.
IEEE Trans. Dependable Sec. Comput., 2017

DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts.
IEEE Systems Journal, 2017

Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy.
MONET, 2017

Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality.
JoWUA, 2017

Heimdall: Mitigating the Internet of Insecure Things.
IEEE Internet of Things Journal, 2017

Overview of Mobile Containerization Approaches and Open Research Directions.
IEEE Security & Privacy, 2017

Security and privacy in social networks.
Concurrency and Computation: Practice and Experience, 2017

Botnets and Internet of Things Security.
IEEE Computer, 2017

Android resource usage risk assessment using hidden Markov model and online learning.
Computers & Security, 2017

Extending social networks with delegation.
Computers & Security, 2017

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications.
IEEE Access, 2017

Fine-Grained Analysis of Packet Loss in MANETs.
IEEE Access, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Provenance-Based Analytics Services for Access Control Policies.
Proceedings of the 2017 IEEE World Congress on Services, 2017

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Distributed Intelligence: Trends in the Management of Complex Systems.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

No one can track you: Randomized authentication in Vehicular Ad-hoc Networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Mission Support for Drones: a Policy Based Approach.
Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, 2017

A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

A Game of Things: Strategic Allocation of Security Resources for IoT.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Security and Privacy in the IoT.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Shortfall-Based Optimal Security Provisioning for Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Privacy Preserving User-Based Recommender System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Proceedings of the Computer Security - ESORICS 2017, 2017

Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Seamless and Secure Bluetooth LE Connection Migration.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

MIST 2017: 9th International Workshop on Managing Insider Security Threats.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

CCS 2017: Women in Cyber Security (CyberW) Workshop.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Memory Safety for Embedded Devices with nesCheck.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Do Sticky Elites Produce Online Knowledge of Higher Quality?
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Privacy-Preserving Multi-Party Analytics over Arbitrarily Partitioned Data.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Data and syntax centric anomaly detection for relational databases.
Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery, 2016

Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks.
ACM Trans. Spatial Algorithms and Systems, 2016

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2016

Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks.
TOSN, 2016

Internet of Things (IoT): Smart and Secure Service Delivery.
ACM Trans. Internet Techn., 2016

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy.
IEEE Trans. Knowl. Data Eng., 2016

Private Cell Retrieval From Data Warehouses.
IEEE Trans. Information Forensics and Security, 2016

Editor's Note.
IEEE Trans. Dependable Sec. Comput., 2016

The State of the Journal Editorial.
IEEE Trans. Dependable Sec. Comput., 2016

pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT.
Transactions on Data Privacy, 2016

DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Transactions on Data Privacy, 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

Editorial of special issue on security and privacy in cloud computing.
J. Inf. Sec. Appl., 2016

GeoInformatica welcomes a new co-editor-in-chief.
GeoInformatica, 2016

Provenance for Wireless Sensor Networks: A Survey.
Data Science and Engineering, 2016

A Data-Driven Evaluation for Insider Threats.
Data Science and Engineering, 2016

Editorial: Introduction to Data Security and Privacy.
Data Science and Engineering, 2016

Introduction to Data Science and Engineering.
Data Science and Engineering, 2016

Protecting outsourced data in cloud computing through access management.
Concurrency and Computation: Practice and Experience, 2016

Security Threats: Protecting the New Cyberfrontier.
IEEE Computer, 2016

Securing Mobile Applications.
IEEE Computer, 2016

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques.
IEEE Access, 2016

A Context-Aware System to Secure Enterprise Content.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

An Application Restriction System for Bring-Your-Own-Device Scenarios.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Building robust temporal user profiles for anomaly detection in file system accesses.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Security Framework for a Drone Delivery Service.
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

User Preference Based Link Inference for Social Network.
Proceedings of the IEEE International Conference on Web Services, 2016

Practical privacy-preserving user profile matching in social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

XACML policy evaluation with dynamic context handling.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Strategic Security Resource Allocation for Internet of Things.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Data Security and Privacy in the IoT.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

SimP: Secure interoperable multi-granular provenance framework.
Proceedings of the 12th IEEE International Conference on e-Science, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Data Security and Privacy: Concepts, Approaches, and Research Directions.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

RahasNym: Pseudonymous Identity Management System for Protecting against Linkability.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Differentially Private K-Means Clustering.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

PANDDE: Provenance-based ANomaly Detection of Data Exfiltration.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

MIST 2016: 8th International Workshop on Managing Insider Security Threats.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Inside Attack Filtering for Robust Sensor Localization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Data privacy for IoT systems: Concepts, approaches, and research directions.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Big data security and privacy.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

2015
XACML Policy Evaluation with Dynamic Context Handling.
IEEE Trans. Knowl. Data Eng., 2015

Privacy-Preserving Detection of Sensitive Data Exposure.
IEEE Trans. Information Forensics and Security, 2015

Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2015

Interdependent Security Risk Analysis of Hosts and Flows.
IEEE Trans. Information Forensics and Security, 2015

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2015

Context-Based Access Control Systems for Mobile Devices.
IEEE Trans. Dependable Sec. Comput., 2015

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
IEEE Trans. Dependable Sec. Comput., 2015

The State of the Journal Editorial.
IEEE Trans. Dependable Sec. Comput., 2015

Marlin: Mitigating Code Reuse Attacks Using Code Randomization.
IEEE Trans. Dependable Sec. Comput., 2015

A Distributed System for The Management of Fine-grained Provenance.
J. Database Manag., 2015

Scalable end-to-end security for advanced metering infrastructures.
Inf. Syst., 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Differentially Private $k$-Means Clustering.
CoRR, 2015

Denial-of-Service Attacks to UMTS.
IEEE Computer, 2015

Building Sensor-Based Big Data Cyberinfrastructures.
IEEE Cloud Computing, 2015

Big Data for Open Digital Innovation - A Research Roadmap.
Big Data Research, 2015

In the shadows we trust: A secure aggregation tolerant watermark for data streams.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices.
Proceedings of the Network and System Security - 9th International Conference, 2015

A trust assessment framework for streaming data in WSNs using iterative filtering.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

Cybersecurity for product lifecycle management a research roadmap.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Collaborative Reputation System Based on Credibility Propagation in WSNs.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Adaptive Trust Update Frequency in MANETs.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Inside Attack Filtering for Robust Sensor Localization.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

RahasNym: Protecting against Linkability in the Digital Identity Ecosystem.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

DetAnom: Detecting Anomalous Database Transactions by Insiders.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

MIST 2015: 7th International Workshop on Managing Insider Security Threats.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Privacy-Preserving Association Rule Mining in Cloud Computing.
Proceedings of the 10th ACM Symposium on Information, 2015

A Secure Communication Protocol for Drones and Smart Objects.
Proceedings of the 10th ACM Symposium on Information, 2015

Big Data - Security and Privacy.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
Homomorphic Encryption and Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12229-8, 2014

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

Privacy-Preserving and Content-Protecting Location Based Queries.
IEEE Trans. Knowl. Data Eng., 2014

Privacy Preserving Delegated Access Control in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization.
IEEE Trans. Knowl. Data Eng., 2014

Secure kNN Query Processing in Untrusted Cloud Environments.
IEEE Trans. Knowl. Data Eng., 2014

Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Sec. Comput., 2014

Editorial.
IEEE Trans. Dependable Sec. Comput., 2014

IdentiDroid: Android can finally Wear its Anonymous Suit.
Trans. Data Privacy, 2014

Attribute Based Group Key Management.
Trans. Data Privacy, 2014

Detecting mobile malware threats to homeland security through static analysis.
J. Network and Computer Applications, 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014

Guest editorial: Information reuse, integration, and reusable systems.
Information Systems Frontiers, 2014

Privacy-Preserving Assessment of Social Network Data Trustworthiness.
Int. J. Cooperative Inf. Syst., 2014

Randomized and Efficient Authentication in Mobile Environments.
IACR Cryptology ePrint Archive, 2014

Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013.
EAI Endorsed Trans. Collaborative Computing, 2014

Privacy-Preserving and Outsourced Multi-User k-Means Clustering.
CoRR, 2014

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases.
CoRR, 2014

Security of new generation computing systems.
Concurrency and Computation: Practice and Experience, 2014

Representation and querying of unfair evaluations in social rating systems.
Computers & Security, 2014

A formal proximity model for RBAC systems.
Computers & Security, 2014

Kinesis: a security incident response and prevention system for wireless sensor networks.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Fine-grained analysis of packet losses in wireless sensor networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provenance-aware security risk analysis for hosts and network flows.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Practical k nearest neighbor queries with location privacy.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms.
Proceedings of the Hybrid Artificial Intelligence Systems - 9th International Conference, 2014

Secure mutual proximity zone enclosure evaluation.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

ID-Based Two-Server Password-Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2014, 2014

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Data Trustworthiness - Approaches and Research Challenges.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Dynamic Privacy Policy Management in Services-Based Interactions.
Proceedings of the Database and Expert Systems Applications, 2014

Elite size and resilience impact on global system structuration in social media.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Security with Privacy - Opportunities and Challenges: Panel Position Paper.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Security with privacy - A research agenda.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Security of graph data: hashing schemes and definitions.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Demo Overview: Privacy-Enhancing Features of IdentiDroid.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Private Information Retrieval
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 9781627051545, 2013

RFID Security and Privacy
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2013

Security-Aware Service Composition with Fine-Grained Information Flow Control.
IEEE Trans. Services Computing, 2013

Single-Database Private Information Retrieval from Fully Homomorphic Encryption.
IEEE Trans. Knowl. Data Eng., 2013

Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

Privacy Preserving Policy-Based Content Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2013

A Similarity Measure for Comparing XACML Policies.
IEEE Trans. Knowl. Data Eng., 2013

Agent-based accountable grid computing systems.
The Journal of Supercomputing, 2013

A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IEEE Trans. Information Forensics and Security, 2013

Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Privacy, 2013

Multi-route query processing and optimization.
J. Comput. Syst. Sci., 2013

Quality Control in Crowdsourcing Systems: Issues and Directions.
IEEE Internet Computing, 2013

Privacy-preserving authentication of trees and graphs.
Int. J. Inf. Sec., 2013

Collaboration in Multicloud Computing Environments: Framework and Security Issues.
IEEE Computer, 2013

Encryption key management for secure communication in smart advanced metering infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Fine-grained analysis of packet loss symptoms in wireless sensor networks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Data Security - Challenges and Research Opportunities.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Private data warehouse queries.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

A Comprehensive Access Control System for Scientific Applications.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy Preserving Context Aware Publish Subscribe Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013

Towards Authenticated Objects.
Proceedings of the Network and System Security - 7th International Conference, 2013

Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.
Proceedings of the Network and System Security - 7th International Conference, 2013

CRIS - Computational research infrastructure for science.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Multiparty privacy protection for electronic health records.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

PostgreSQL anomalous query detector.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient and accurate strategies for differentially-private sliding window queries.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient tree pattern queries on encrypted XML documents.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient General Policy Decision by Using Mutable Variable Aware Cache.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Big Data - Opportunities and Challenges Panel Position Paper.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Preface.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

A file provenance system.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Adaptive data protection in distributed systems.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

An efficient certificateless cryptography scheme without pairing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

FENCE: continuous access control enforcement in dynamic data stream environments.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

A secure architecture design based on application isolation, code minimization and randomization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure and resilient proximity-based access control.
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013

Performance signatures of mobile phone browsers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Data quality evaluation: integrating security and accuracy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Collusion Detection in Online Rating Systems.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

Role-based access control to outsourced data in could computing.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

2012
Data Protection from Insider Threats
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, 2012

Special issue: best papers of VLDB 2010.
VLDB J., 2012

A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Sec. Comput., 2012

Privacy-Preserving Enforcement of Spatially Aware RBAC.
IEEE Trans. Dependable Sec. Comput., 2012

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
IEEE Trans. Dependable Sec. Comput., 2012

A Hybrid Approach to Private Record Matching.
IEEE Trans. Dependable Sec. Comput., 2012

Defending against insider threats and internal data leakage.
Security and Communication Networks, 2012

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
MONET, 2012

A role-involved purpose-based access control model.
Information Systems Frontiers, 2012

On Hashing Graphs.
IACR Cryptology ePrint Archive, 2012

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
IACR Cryptology ePrint Archive, 2012

Using automated individual white-list to protect web digital identities.
Expert Syst. Appl., 2012

Privacy-Preserving Fine-Grained Access Control in Public Clouds.
IEEE Data Eng. Bull., 2012

An Analytic Approach to People Evaluation in Crowdsourcing Systems
CoRR, 2012

Detecting, Representing and Querying Collusion in Online Rating Systems
CoRR, 2012

Cryptographic Key Management for Smart Power Grids - Approaches and Issues
CoRR, 2012

Preserving privacy of feedback providers in decentralized reputation systems.
Computers & Security, 2012

On XACML's Adequacy to Specify and to Enforce HIPAA.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Modeling the Risk & Utility of Information Sharing in Social Networks.
Proceedings of the 2012 International Conference on Privacy, 2012

Authenticated Top-K Aggregation in Distributed and Outsourced Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Efficient privacy preserving content based publish subscribe systems.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Emerging trends around big data analytics and security: panel.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Secure sensor network SUM aggregation with detection of malicious nodes.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Privacy preserving delegated access control in the storage as a service model.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Panel: Using information re-use and integration principles in big data.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

A Comprehensive Model for Provenance.
Proceedings of the Provenance and Annotation of Data and Processes, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Privacy-Preserving and Content-Protecting Location Based Queries.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

A Comprehensive Model for Provenance.
Proceedings of the Advances in Conceptual Modeling, 2012

Towards a theory for privacy preserving distributed OLAP.
Proceedings of the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, 2012, 2012

Privacy-preserving assessment of social network data trustworthiness.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Reputation management in crowdsourcing systems.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

A formal proximity model for RBAC systems.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

On practical specification and enforcement of obligations.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Leakage-free redactable signatures.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Adaptive data management for self-protecting objects in cloud computing systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Demonstrating a lightweight data provenance for sensor networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Marlin: making it harder to fish for gadgets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
ACConv - An Access Control Model for Conversational Web Services.
TWEB, 2011

Design and Implementation of an Intrusion Response System for Relational Databases.
IEEE Trans. Knowl. Data Eng., 2011

Privacy-Preserving Updates to Anonymous and Confidential Databases.
IEEE Trans. Dependable Sec. Comput., 2011

On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
IEEE Trans. Dependable Sec. Comput., 2011

Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications.
IEEE Pervasive Computing, 2011

A Conditional Role-Involved Purpose-Based Access Control Model.
J. Org. Computing and E. Commerce, 2011

DECHO - a framework for the digital exploration of cultural heritage objects.
JOCCH, 2011

Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach.
J. Comput. Syst. Sci., 2011

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011

Access Control for Databases: Concepts and Systems.
Foundations and Trends in Databases, 2011

A conditional purpose-based access control model with dynamic roles.
Expert Syst. Appl., 2011

Trust establishment in the formation of Virtual Organizations.
Computer Standards & Interfaces, 2011

Fine-grained integration of access control policies.
Computers & Security, 2011

Efficient systematic clustering method for k-anonymization.
Acta Inf., 2011

Private searching for single and conjunctive keywords on streaming data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

xfACL: an extensible functional language for access control.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Profile-Based Selection of Accountability Policies in Grid Computing Systems.
Proceedings of the POLICY 2011, 2011

Protecting information systems from insider threats - concepts and issues.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Aggregated Privacy-Preserving Identity Verification for Composite Web Services.
Proceedings of the IEEE International Conference on Web Services, 2011

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

A New Class of Buffer Overflow Attacks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A New Approach to Weighted Multi-Secret Sharing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Prox-RBAC: a proximity-based spatially aware RBAC.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Privacy-preserving assessment of location data trustworthiness.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Location-based access control systems for mobile users: concepts and research directions.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

Secure cryptographic key management system (CKMS) considerations for smart grid devices.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards privacy preserving access control in the cloud.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: towards attribute based group key management.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

PUF ROKs: a hardware approach to read-once keys.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

2010
A General Framework for Web Content Filtering.
World Wide Web, 2010

Multifactor Identity Verification Using Aggregated Proof of Knowledge.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distrib. Syst., 2010

Privacy-aware role-based access control.
ACM Trans. Inf. Syst. Secur., 2010

Mining Roles with Multiple Objectives.
ACM Trans. Inf. Syst. Secur., 2010

The PROBE Framework for the Personalized Cloaking of Private Locations.
Trans. Data Privacy, 2010

Guest Editors' Introduction: Data Quality in the Internet Era.
IEEE Internet Computing, 2010

EXAM: a comprehensive environment for the analysis of access control policies.
Int. J. Inf. Sec., 2010

Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Mask: a system for privacy-preserving policy-based access to published content.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Assuring Data Trustworthiness - Concepts and Research Challenges.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Enforcing spatial constraints for mobile RBAC systems.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

A secure multiparty computation privacy preserving OLAP framework over distributed XML data.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Privilege States Based Access Control for Fine-Grained Intrusion Response.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Efficient privacy preserving reputation protocols inspired by secure sum.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

JTAM - A Joint Threshold Administration Model.
Proceedings of the POLICY 2010, 2010

Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

A Role-Involved Conditional Purpose-Based Access Control Model.
Proceedings of the E-Government, E-Services and Global Processes, 2010

Efficient and privacy-preserving enforcement of attribute-based access control.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Biometrics-based identifiers for digital identity management.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Policy-Driven Service Composition with Information Flow Control.
Proceedings of the IEEE International Conference on Web Services, 2010

A privacy-preserving approach to policy-based content dissemination.
Proceedings of the 26th International Conference on Data Engineering, 2010

Credibility-enhanced curated database: Improving the value of curated databases.
Proceedings of the 26th International Conference on Data Engineering, 2010

FENCE: Continuous access control enforcement in dynamic data stream environments.
Proceedings of the 26th International Conference on Data Engineering, 2010

PEAR: a hardware based protocol authentication system.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

Privacy-preserving matching of spatial datasets with protection against background knowledge.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Analyzing semantic locations cloaking techniques in a probabilistic grid-based map.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

How to authenticate graphs without leaking.
Proceedings of the EDBT 2010, 2010

Private record matching using differential privacy.
Proceedings of the EDBT 2010, 2010

Provenance-based trustworthiness assessment in sensor networks.
Proceedings of the 7th Workshop on Data Management for Sensor Networks, 2010

Privacy preserving identity attribute verification in windows cardspace.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Privacy-preserving similarity measurement for access control policies.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Publishing Time-Series Data under Preservation of Privacy and Distance Orders.
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010

A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

Vulnerabilities leading to denial of services attacks in grid computing systems: a survey.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

PUF ROKs: generating read-once keys from physically unclonable functions.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Digital identity enrolment and assurance support for VeryIDX.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A policy-based approach for assuring data integrity in DBMSs.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Controlling data disclosure in computational PIR protocols.
Proceedings of the 5th ACM Symposium on Information, 2010

Risk-based access control systems built on fuzzy inferences.
Proceedings of the 5th ACM Symposium on Information, 2010

Systematic clustering method for l-diversity model.
Proceedings of the Database Technologies 2010, 2010

Security for Web Services and Service-Oriented Architectures.
Springer, ISBN: 978-3-540-87741-7, 2010

2009
Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems.
IEEE Trans. Services Computing, 2009

Efficient integration of fine-grained access control and resource brokering in grid.
The Journal of Supercomputing, 2009

Security Analysis of the SASI Protocol.
IEEE Trans. Dependable Sec. Comput., 2009

Location Privacy in Moving-Object Environments.
Trans. Data Privacy, 2009

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.
Trans. Data Privacy, 2009

Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS.
Trans. Data Privacy, 2009

Privacy-preserving techniques for location-based services.
SIGSPATIAL Special, 2009

A risk management approach to RBAC.
Risk and Decision Analysis, 2009

Query Mesh: Multi-Route Query Processing Technology.
PVLDB, 2009

Tagging Stream Data for Rich Real-Time Services.
PVLDB, 2009

TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
PVLDB, 2009

A distributed approach to enabling privacy-preserving model-based classifier training.
Knowl. Inf. Syst., 2009

Security for Web Services: Standards and Research Issues.
Int. J. Web Service Res., 2009

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
JSW, 2009

Privacy-preserving incremental data dissemination.
Journal of Computer Security, 2009

Specification and enforcement of flexible security policy for active cooperation.
Inf. Sci., 2009

A comprehensive simulation tool for the analysis of password policies.
Int. J. Inf. Sec., 2009

Privacy-Aware Role-Based Access Control.
IEEE Security & Privacy, 2009

Policy framework for security and privacy management.
IBM Journal of Research and Development, 2009

Analysis of privacy and security policies.
IBM Journal of Research and Development, 2009

Privacy-preserving Digital Identity Management for Cloud Computing.
IEEE Data Eng. Bull., 2009

An Interoperable Approach to Multifactor Identity Verification.
IEEE Computer, 2009

L'Elimination de la subjectivité dans la recommandation de confiance.
Proceedings of the Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, 2009

A Hybrid Technique for Private Location-Based Queries with Database Protection.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Adaptive Management of Multigranular Spatio-Temporal Object Attributes.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Effective and efficient implementation of an information flow control protocol for service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Assured information sharing: concepts and issues.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

StreamShield: a stream-centric approach towards security and privacy in data stream environments.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

An algebra for fine-grained integration of XACML policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Automating role-based provisioning by learning from examples.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Access control policy combining: theory meets practice.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Supporting RBAC with XACML+OWL.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Visualization for Access Control Policy Analysis Results Using Multi-level Grids.
Proceedings of the POLICY 2009, 2009

VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices.
Proceedings of the MDM 2009, 2009

Interactive Location Cloaking with the PROBE Obfuscator.
Proceedings of the MDM 2009, 2009

A Characterization of the problem of secure provenance management.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


TIUPAM: A Framework for Trustworthiness-Centric Information Sharing.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Elimination of Subjectivity from Trust Recommendation.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Context-Dependent Authentication and Access Control.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Privacy-preserving management of transactions' receipts for mobile environments.
Proceedings of the IDtrust 2009, 2009

The SCIFC Model for Information Flow Control in Web Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2009

Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

Privacy Preserving OLAP over Distributed XML Documents.
Proceedings of the ICPPW 2009, 2009

Multi-granular Spatio-temporal Object Models: Concepts and Research Directions.
Proceedings of the Object Databases, Second International Conference, 2009

A Comprehensive Approach for Solving Policy Heterogeneity.
Proceedings of the ICEIS 2009, 2009

Using Anonymized Data for Classification.
Proceedings of the 25th International Conference on Data Engineering, 2009

The Design and Evaluation of Accountable Grid Computing System.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Towards location-based access control in healthcare emergency response.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Can an inter-disciplinary research community on location privacy be successful?
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Research issues in data provenance for streaming environments.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Preventing velocity-based linkage attacks in location-aware applications.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Protecting location privacy against spatial inferences: the PROBE approach.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Assessing the trustworthiness of location data based on provenance.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Self-tuning query mesh for adaptive multi-route query processing.
Proceedings of the EDBT 2009, 2009

The Challenge of Assuring Data Trustworthiness.
Proceedings of the Database Systems for Advanced Applications, 2009

An assessment of accountability policies for large-scale distributed computing systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Aggregating uncertain access risk estimations from different sources invited paper.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

D-algebra for composing access control policy decisions.
Proceedings of the 2009 ACM Symposium on Information, 2009

Physically restricted authentication with trusted hardware.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Location-Aware Authentication and Access Control.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Improving Scalability of Software Cloud for Composite Web Services.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

2008
A Survey of Quantification of Privacy Preserving Data Mining Algorithms.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Object-Oriented Databases.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Detecting anomalous access patterns in relational databases.
VLDB J., 2008

A New Model for Secure Dissemination of XML Content.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2008

Anonymous Geo-Forwarding in MANETs through Location Cloaking.
IEEE Trans. Parallel Distrib. Syst., 2008

Secure Collaboration in a Mediator-Free Distributed Environment.
IEEE Trans. Parallel Distrib. Syst., 2008

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries.
IEEE Trans. Parallel Distrib. Syst., 2008

Watermarking Relational Databases Using Optimization-Based Techniques.
IEEE Trans. Knowl. Data Eng., 2008

XACML Policy Integration Algorithms.
ACM Trans. Inf. Syst. Secur., 2008

Formal foundations for hybrid hierarchies in GTRBAC.
ACM Trans. Inf. Syst. Secur., 2008

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
IEEE Trans. Dependable Sec. Comput., 2008

Structural signatures for tree data structures.
PVLDB, 2008

An Access-Control Framework for WS-BPEL.
Int. J. Web Service Res., 2008

Spatial Domains for the Administration of Location-based Access Control Policies.
J. Network Syst. Manage., 2008

Measuring the structural similarity among XML documents and DTDs.
J. Intell. Inf. Syst., 2008

Semantics-aware Obfuscation for Location Privacy.
JCSE, 2008

Cryptanalysis of Some RFID Authentication Protocols.
JCM, 2008

Context-Aware Adaptation of Access-Control Policies.
IEEE Internet Computing, 2008

Policy Mapper: Administering Location-Based Access-Control Policies.
IEEE Internet Computing, 2008

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

Privacy-Preserving Techniques for Location-Based Services.
Proceedings of the Sixteenth Italian Symposium on Advanced Database Systems, 2008

Responding to Anomalous Database Requests.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

An Approach to Evaluate Data Trustworthiness Based on Data Provenance.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

An obligation model bridging access control policies and privacy policies.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Mining roles with semantic meanings.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Policy decomposition for collaborative access control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Database Intrusion Detection and Response.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

EXAM: An Environment for Access Control Policy Analysis and Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Multi-domain and privacy-aware role based access control in eHealth.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Proactive Role Discovery in Mediator-Free Environments.
Proceedings of the Proceedings P2P'08, 2008

Privacy-Preserving Accountable Accuracy Management Systems (PAAMS).
Proceedings of the Protecting Persons While Protecting the People, 2008

Cryptanalysis of the LCSS RFID Authentication Protocol.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Protecting Location Privacy through Semantics-aware Obfuscation Techniques.
Proceedings of the Trust Management II, 2008

Authorization and User Failure Resiliency for WS-BPEL Business Processes.
Proceedings of the Service-Oriented Computing, 2008

Continuous Intersection Joins Over Moving Objects.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privately Updating Suppression and Generalization based k-Anonymous Databases.
Proceedings of the 24th International Conference on Data Engineering, 2008

Trust establishment in the formation of Virtual Organizations.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Protecting Databases from Query Flood Attacks.
Proceedings of the 24th International Conference on Data Engineering, 2008

A Security Punctuation Framework for Enforcing Access Control on Streaming Data.
Proceedings of the 24th International Conference on Data Engineering, 2008

Secure Delta-Publishing of XML Content.
Proceedings of the 24th International Conference on Data Engineering, 2008

A Hybrid Approach to Private Record Linkage.
Proceedings of the 24th International Conference on Data Engineering, 2008

Position transformation: a location privacy protection method for moving objects.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Multigranular spatio-temporal models: implementation challenges.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

Security and privacy for geospatial data: concepts and research directions.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Approach to Supporting Continuity of Usage in Location-Based Access Control.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Minimal credential disclosure in trust negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Querying Multigranular Spatio-temporal Objects.
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008

A Federated Digital Identity Management Approach for Business Processes.
Proceedings of the Collaborative Computing: Networking, 2008

High-Assurance Integrity Techniques for Databases.
Proceedings of the Sharing Data, 2008

A Policy-Based Accountability Tool for Grid Computing Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.
Proceedings of the The Third International Conference on Availability, 2008

2007
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

GEO-RBAC: A spatially aware RBAC.
ACM Trans. Inf. Syst. Secur., 2007

An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks.
IEEE Trans. Dependable Sec. Comput., 2007

Privacy preserving multi-factor authentication with biometrics.
Journal of Computer Security, 2007

A dynamic key management solution to access hierarchy.
Int. Journal of Network Management, 2007

A system for securing push-based distribution of XML documents.
Int. J. Inf. Sec., 2007

Data security in location-aware applications: an approach based on RBAC.
IJICS, 2007

A Critique of the ANSI Standard on Role-Based Access Control.
IEEE Security & Privacy, 2007

Trust Negotiation in Identity Management.
IEEE Security & Privacy, 2007

Modeling and language support for the management of pattern-bases.
Data Knowl. Eng., 2007

Replacing Lost or Stolen E-Passports.
IEEE Computer, 2007

An integrated approach to federated identity and privilege management in open systems.
Commun. ACM, 2007

A roadmap for comprehensive online privacy policy management.
Commun. ACM, 2007

Information carrying identity proof trees.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Challenges of Testing Web Services and Security in SOA Implementations.
Proceedings of the Test and Analysis of Web Services, 2007

Privacy preserving schema and data matching.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

A privacy preserving assertion based policy language for federation systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Privacy-aware role based access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

An approach to evaluate policy similarity.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Decentralized authorization and data security in web content delivery.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

XACML Function Annotations.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Service-oriented Approach to Security - Concepts and Issues.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

Profiling Database Application to Detect SQL Injection Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

User Tasks and Access Control overWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Privacy Requirements in Identity Management Solutions.
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007

Access Control Strategies for Virtualized Environments in Grid Computing Systems.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

A Service-Oriented Approach to Security-Concepts and Issues.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

Conditional Privacy-Aware Role Based Access Control.
Proceedings of the Computer Security, 2007

Password policy simulation and analysis.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Receipt management- transaction history based trust establishment.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Data Management in RFID Applications.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Efficient k -Anonymization Using Clustering Techniques.
Proceedings of the Advances in Databases: Concepts, 2007

A structure preserving approach for securing XML documents.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Database Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Ws-AC: A Fine Grained Access Control System for Web Services.
World Wide Web, 2006

Secure knowledge management: confidentiality, trust, and privacy.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

X-FEDERATE: A Policy Engineering Framework for Federated Access Management.
IEEE Trans. Software Eng., 2006

Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems.
ACM Trans. Inf. Syst. Secur., 2006

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Sec. Comput., 2006

Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges.
SIGMOD Record, 2006

An Adaptive Access Control Model for Web Services.
Int. J. Web Service Res., 2006

Establishing and protecting digital identity in federation systems.
Journal of Computer Security, 2006

Policies and IT Technologies: A Puzzle of Two Pieces.
IEEE Internet Computing, 2006

A secure framework for publishing virtual community contracts.
IJWBC, 2006

Workflow authorisation in mediator-free environments.
IJSN, 2006

Integration of virtual reality and database systems for cultural heritage dissemination.
IJCSE, 2006

A multigranular object-oriented framework supporting spatio-temporal granularity conversions.
International Journal of Geographical Information Science, 2006

A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy).
Computers & Geosciences, 2006

Foreword.
Annales des Télécommunications, 2006

Access control enforcement for conversation-based web services.
Proceedings of the 15th international conference on World Wide Web, 2006

Towards a contextualized access to the cultural heritage world using 360 Panoramic Images.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Secure Anonymization for Incremental Datasets.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Access control, confidentiality and privacy for video surveillance databases.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Fine-grained role-based delegation in presence of the hybrid role hierarchy.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Systematic control and management of data integrity.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Architectural issues for a location-aware role-based access control system.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Digital identity management and protection.
Proceedings of the 2006 International Conference on Privacy, 2006

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.
Proceedings of the Privacy in Statistical Databases, 2006

Policy Languages for Digital Identity Management in Federation Systems.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Preserving User Location Privacy in Mobile Data Management Infrastructures.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Extended RBAC with Role Attributes.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Access Control and Privacy in Location-Aware Services forMobile Organizations.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Access Control and Authorization Constraints for WS-BPEL.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Private Updates to Anonymous Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Secure Dissemination of XML Content Using Structure-based Routing.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

Privacy preserving multi-factor authentication with biometrics.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the 10th International Conference on CSCW in Design, 2006

A semantic approach to build personalized interfaces in the cultural heritage domain.
Proceedings of the working conference on Advanced visual interfaces, 2006

Security in SOA and Web Services.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
Secure Interoperation in a Multidomain Environment Employing RBAC Policies.
IEEE Trans. Knowl. Data Eng., 2005

A Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Knowl. Data Eng., 2005

X-gtrbac admin: A decentralized administration model for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005

X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005

An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Dependable Sec. Comput., 2005

Database Security-Concepts, Approaches, and Challenges.
IEEE Trans. Dependable Sec. Comput., 2005

The Indiana Center for Database Systems at Purdue University.
SIGMOD Record, 2005

An apples-to-apples comparison of two database journals.
SIGMOD Record, 2005

Towards structure discovering in video data.
J. Exp. Theor. Artif. Intell., 2005

An approach to cooperative updates of XML documents in distributed systems.
Journal of Computer Security, 2005

A Trust-Based Context-Aware Access Control Model for Web-Services.
Distributed and Parallel Databases, 2005

A Framework for Evaluating Privacy Preserving Data Mining Algorithms.
Data Min. Knowl. Discov., 2005

Reasoning about RDF statements with default rules.
Proceedings of the W3C Workshop on Rule Languages for Interoperability, 2005

Efficient hierarchical key generation and key diffusion for sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor, 2005

SERAT: SEcure role mApping technique for decentralized secure interoperability.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Purpose based access control of complex data for privacy protection.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

GEO-RBAC: a spatially aware RBAC.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

PDL with Preferences.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study.
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005

Spatial Knowledge-Based Applications and Technologies: Research Issues.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Integrated Approach to Rating and Filtering Web Content.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

P-Hera: Scalable fine-grained access control for P2P infrastructures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Assuring Security Properties in Third-party Architectures.
Proceedings of the 21st International Conference on Data Engineering, 2005

Privacy and Ownership Preserving of Outsourced Medical Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

An Update Protocol for XML Documents in Distributed and Cooperative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Privacy-Preserving Database Systems.
Proceedings of the Foundations of Security Analysis and Design III, 2005

Integration of Virtual Reality and Database System Techniques.
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005

Access control management in a distributed environment supporting dynamic collaboration.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

Establishing and protecting digital identity in federation systems.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

A Multi-Strategy Approach to Rating and Filtering Online Resources.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Information Driven Evaluation of Data Hiding Algorithms.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

Purpose Based Access Control for Privacy Protection in Database Systems.
Proceedings of the Database Systems for Advanced Applications, 2005

A novel approach for privacy-preserving video sharing.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Securing XML data in third-party distribution systems.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Secure collaboration in mediator-free environments.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

Intrusion Detection in RBAC-administered Databases.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Efficient Integration of Fine-grained Access Control in Large-scale Grid Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Information Security.
Proceedings of the Practical Handbook of Internet Computing., 2004

Guest Editors' Introduction.
World Wide Web, 2004

Association Rule Hiding.
IEEE Trans. Knowl. Data Eng., 2004

Extending the ODMG Object Model with Triggers.
IEEE Trans. Knowl. Data Eng., 2004

Trust-X: A Peer-to-Peer Framework for Trust Establishment.
IEEE Trans. Knowl. Data Eng., 2004

Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

State-of-the-art in privacy preserving data mining.
SIGMOD Record, 2004

CiVeDi: A Customized Virtual Environment for Database Interaction.
SIGMOD Record, 2004

A Logical Approach to Quality of Service Specification in Video Databases.
Multimedia Tools Appl., 2004

Handling Expiration of Multigranular Temporal Objects.
J. Log. Comput., 2004

Merkle Tree Authentication in UDDI Registries.
Int. J. Web Service Res., 2004

Access control for XML documents and data.
Inf. Sec. Techn. Report, 2004

A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications.
Inf. Syst., 2004

Access-Control Language for Multidomain Environments.
IEEE Internet Computing, 2004

Guest Editors' Introduction: Data Dissemination on the Web.
IEEE Internet Computing, 2004

Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations.
International Journal of Software Engineering and Knowledge Engineering, 2004

Enhancing the expressive power of the U-Datalog language
CoRR, 2004

XML-Based Specification for Web Services Document Security.
IEEE Computer, 2004

A Policy Framework for Access Management in Federated Information Sharing.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Modeling and Language Support for the Management of Pattern-Bases.
Proceedings of the 16th International Conference on Scientific and Statistical Database Management (SSDBM 2004), 2004

Exploiting User-Profiles for the Selective Dissemination of XML Documents.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004

X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Security for grid-based computing systems issues and challenges.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

An Access Control System for a Web Map Management Service.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

A Framework for Contractual Resource Sharing in Coalitions.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

A Framework for Data Mining Pattern Management.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

Privacy-Preserving Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Towards a Language for Pattern Manipulation and Querying.
Proceedings of the Intl. Workshop on Pattern Representation and Management, 2004

Securing DBMS: Characterizing and Detecting Query Floods.
Proceedings of the Information Security, 7th International Conference, 2004

An XML-Based Approach to Document Flow Verification.
Proceedings of the Information Security, 7th International Conference, 2004

Flow policies: specification and enforcement.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

A Trigger-Based Approach for Communication Personalization.
Proceedings of the 8th International Database Engineering and Applications Symposium (IDEAS 2004), 2004

A Trust-based Context-Aware Access Control Model for Web-Services.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

XJoin Index: Indexing XML Data for Efficient Handling of Branching Path Expressions.
Proceedings of the 20th International Conference on Data Engineering, 2004

Grid based methods for estimating spatial join selectivity.
Proceedings of the 12th ACM International Workshop on Geographic Information Systems, 2004

An authorization model for geographical maps.
Proceedings of the 12th ACM International Workshop on Geographic Information Systems, 2004

Towards Supporting Fine-Grained Access Control for Grid Resources.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

A Flexible Access Control Model for Web Services.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

Access to Multigranular Temporal Objects.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

DiXeminator: A Profile-Based Selective Dissemination System for XML Documents.
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
Proceedings of the Digital Library Architectures: Peer-to-Peer, 2004

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.
Proceedings of the Communications and Multimedia Security, 2004

Purpose based access control for privacy protection.
Proceedings of the 20èmes Journées Bases de Données Avancées, 2004

A Fine-Grained Access Control Model for Web Services.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Introducing Dynamic Behavior in Amalgamated Knowledge Bases.
TPLP, 2003

A hierarchical access control model for video database systems.
ACM Trans. Inf. Syst., 2003

Static Analysis of Logical Languages with Deferred Update Semantics.
IEEE Trans. Knowl. Data Eng., 2003

A logical framework for reasoning about access control models.
ACM Trans. Inf. Syst. Secur., 2003

A Database Approach to Quality of Service Specification in Video Databases.
SIGMOD Record, 2003

Ordering and Path Constraints over Semistructured Data.
J. Intell. Inf. Syst., 2003

Refined rules termination analysis through transactions.
Inf. Syst., 2003

T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management.
Inf. Syst., 2003

Content-based filtering of Web documents: the MaX system and the EUFORBIA project.
Int. J. Inf. Sec., 2003

Quality of Service Specification in Video Databases.
IEEE MultiMedia, 2003

Hierarchical data placement for navigational multimedia applications.
Data Knowl. Eng., 2003

A set-oriented method definition language for object databases and its semantics.
Concurrency and Computation: Practice and Experience, 2003

RBAC models - concepts and trends.
Computers & Security, 2003

Trustworthy objects.
L'OBJET, 2003

ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage.
Proceedings of the SIGGRAPH 2003 Conference on Sketches & Applications: in conjunction with the 30th annual conference on Computer graphics and interactive techniques, 2003

Memorizzazione di regole per l'instradamento di messaggi in un sistema di comunicazione universale.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

Grid Based Methods for the Spatial Join Estimation.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

Dependencies and separation of duty constraints in GTRBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

An infrastructure for managing secure update operations on XML data.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

X-TNL: An XML-based Language for Trust Negotiations.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

PDL with Maximum Consistency Monitors.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

An abstraction-based approach to measuring the structural similarity between two unordered XML documents.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

A multigranular spatiotemporal data model.
Proceedings of the ACM-GIS 2003, 2003

A reference framework for integrating multiple representations of geographical maps.
Proceedings of the ACM-GIS 2003, 2003

Signature and Access Control Policies for XML Documents.
Proceedings of the Computer Security, 2003

Towards a Logical Model for Patterns.
Proceedings of the Conceptual Modeling, 2003

Author-Chi - A System for Secure Dissemination and Update of XML Documents.
Proceedings of the Databases in Networked Information Systems, 2003

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Supporting Delegation in Secure Workflow Management Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

PC Co-chairs' Message.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003

Trust-Chi: An XML Framework for Trust Negotiations.
Proceedings of the Communications and Multimedia Security, 2003

Local Closed-World Assumptions for reasoning about Semantic Web data.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003

User Preferences VS Minimality in PPDL.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003

2002
An authorization system for digital libraries.
VLDB J., 2002

A Content-Based Authorization Model for Digital Libraries.
IEEE Trans. Knowl. Data Eng., 2002

Secure and selective dissemination of XML documents.
ACM Trans. Inf. Syst. Secur., 2002

A Knowledge-Based Approach to Visual Information.
J. Intell. Inf. Syst., 2002

Guest Editors' Introduction: Database Technology on the Web.
IEEE Internet Computing, 2002

IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web.
IEEE Distributed Systems Online, 2002

Workflow Architecture for Interactive Video Management Systems.
Distributed and Parallel Databases, 2002

Protection and administration of XML data sources.
Data Knowl. Eng., 2002

Using spatial data access structures for filtering nearest neighbor queries.
Data Knowl. Eng., 2002

Introducing Dynamic Behavior in Amalgamated Knowledge Bases
CoRR, 2002

Evolution Specification of Multigranular Temporal Objects.
Proceedings of the 9th International Symposium on Temporal Representation and Reasoning, 2002

Temporal hierarchies and inheritance semantics for GTRBAC.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Making access control more usable.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

A System to Specify and Manage Multipolicy Access Control Models.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

Matching an XML Document against a Set of DTDs.
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002

Rules Termination Analysis investigating the interaction between transactions and triggers.
Proceedings of the International Database Engineering & Applications Symposium, 2002

An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002

Evolving a Set of DTDs According to a Dynamic Set of XML Documents.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

Distributed Cooperative Updates of XML Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Ma X : An Access Control System for Digital Libraries and the Web.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

A temporal key management scheme for secure broadcasting of XML documents.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Enhancing the expressive power of the U-Datalog language.
TPLP, 2001

Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'.
IEEE Trans. Knowl. Data Eng., 2001

A nested transaction model for multilevel secure database management systems.
ACM Trans. Inf. Syst. Secur., 2001

TRBAC: A temporal role-based access control model.
ACM Trans. Inf. Syst. Secur., 2001

Quality of Service in Multimedia Digital Libraries.
SIGMOD Record, 2001

XML security.
Inf. Sec. Techn. Report, 2001

Role Based Access Control Models.
Inf. Sec. Techn. Report, 2001

XML and Data Integration.
IEEE Internet Computing, 2001

Securing XML Documents with Author-X.
IEEE Internet Computing, 2001

Integrating XML and Databases.
IEEE Internet Computing, 2001

Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries.
Fundam. Inform., 2001

Directions for Web and E-Commerce Applications Security.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Navigating Through Multiple Temporal Granularity Objects.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

A Linguistic Framework for Querying Dimensional Data.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

Securing XML Documents: the Author-X Project Demonstration.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

A logical framework for reasoning about access control models.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

On specifying security policies for web documents with an XML-based language.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

An Access Control Mechanism for Large Scale Data Dissemination Systems.
Proceedings of the Eleventh International Workshop on Research Issues in Data Engineering: Document Management for Data Intensive Business and Scientific Applications, 2001

A Secure Publishing Service for Digital Libraries of XML Documents.
Proceedings of the Information Security, 4th International Conference, 2001

Hiding Association Rules by Using Confidence and Support.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Introducing Cooperation and Actions in Amalgamated Knowledge Bases.
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001

Intelligent Database Systems
Addison-Wesley, ISBN: 0-201-87736-8, 2001

2000
Specifying and enforcing access control policies for XML document sources.
World Wide Web, 2000

ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Guest Editorial: Introduction to the Special Section.
IEEE Trans. Knowl. Data Eng., 2000

Guest Editorial: Introduction to the Special Section.
IEEE Trans. Knowl. Data Eng., 2000

Trigger Inheritance and Overriding in an Active Object Database System.
IEEE Trans. Knowl. Data Eng., 2000

MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations.
IEEE Trans. Knowl. Data Eng., 2000

An index allocation tool for object-oriented database systems.
Softw., Pract. Exper., 2000

A Logical Approach to Cooperative Information Systems.
J. Log. Program., 2000

Temporal Authorization Bases: From Specification to Integration.
Journal of Computer Security, 2000

A Logic-Based Approach for Enforcing Access Control.
Journal of Computer Security, 2000

A Semantic-Based Execution Model for Multilevel Secure Workflows.
Journal of Computer Security, 2000

Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels.
ACM SIGMOD Digital Review, 2000

Review - Role Hierarchies and Constraints for Lattice-Based Access Controls.
ACM SIGMOD Digital Review, 2000

Review - Data Mining: An Overview from a Database Perspective.
ACM SIGMOD Digital Review, 2000

Review - Supporting Valid-Time Indeterminacy.
ACM SIGMOD Digital Review, 2000

Flexible Transaction Dependencies in Database Systems.
Distributed and Parallel Databases, 2000

Protecting information on the Web.
Commun. ACM, 2000

Triggers in Java-based Databases.
L'OBJET, 2000

Querying Multiple Temporal Granularity Data.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

TRBAC: a temporal role-based access control model.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

A Semi-automatic System for Conceptual Annotation, its Application to Resource Construction and Evaluation.
Proceedings of the Second International Conference on Language Resources and Evaluation, 2000

Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries.
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000

Fuzzy and Presentation Algebras for Web and Multimedia Data.
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000

Exception Handling in Object-Oriented Databases.
Proceedings of the Advances in Exception Handling Techniques (the book grow out of a ECOOP 2000 workshop), 2000

Author-X: A Java-Based System for XML Data Protection.
Proceedings of the Data and Application Security, 2000

Protecting XML Documents: Position Paper.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

An Access Control Model for Video Database Systems.
Proceedings of the 2000 ACM CIKM International Conference on Information and Knowledge Management, 2000

1999
A Flexible Authorization Mechanism for Relational Data Management Systems.
ACM Trans. Inf. Syst., 1999

The Indispensability of Dispensable Indexes.
IEEE Trans. Knowl. Data Eng., 1999

The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999

Object-Oriented Databases and Applications - Selected Papers from ICDE'98.
TAPOS, 1999

Secure Object Deletion and Garbage Collection in Multilevel Object Bases.
Journal of Computer Security, 1999

Finitely Representable Nested Relations.
Inf. Process. Lett., 1999

Review - An Authorization Mechanism for a Relational Data Base System.
ACM SIGMOD Digital Review, 1999

Modeling Spatio-Temporal Constraints for Multimedia Objects.
Data Knowl. Eng., 1999

Controlled Access and Dissemination of XML Documents.
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999

A Conceptual Annotation Approach to Indexing in a Web-Based Information System.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999

A Temporal Object-Oriented Data Model with Multiple Granularities.
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999

Applying Data Mining Techniques to Wafer Manufacturing.
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1999

CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents.
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999

CONCERTO, Conceptual Indexing, Querying and Retrieval of Digital Documents.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Indexing Constraint Databases by Using a Dual Representation.
Proceedings of the 15th International Conference on Data Engineering, 1999

Inheritance in a Deductive Object Database Language with Updates.
Proceedings of the Transactions and Database Dynamics, 1999

Inheritance in a Deductive Object Database Language with Updates.
Proceedings of the Transactions and Database Dynamics, 1999

An Approach to Classify Semi-structured Objects.
Proceedings of the ECOOP'99, 1999

An adaptive concurrency control protocol for mobile transactions.
Proceedings of the Mobile Networks and Computing, 1999

Specifying and Computing Hierarchies of Temporal Authorizations.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

Approximation Techniques for Indexing Two-Dimensional Constraint Databases.
Proceedings of the Database Systems for Advanced Applications, 1999

A Logical Framework for Reasoning on Data Access Control Policies.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

Protecting Information in the Web - Position Paper.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
ACM Trans. Database Syst., 1998

Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

Navigational Accesses in a Temporal Object Model.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Synchronization Models for Multimedia Data.
IEEE Trans. Knowl. Data Eng., 1998

An Extended Algebra for Constraint Databases.
IEEE Trans. Knowl. Data Eng., 1998

Exception-Based Information Flow Control in Object-Oriented Systems.
ACM Trans. Inf. Syst. Secur., 1998

Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
TAPOS, 1998

A Constraint-Based Approach to Shape Management in Multimedia Databases.
Multimedia Syst., 1998

A Formal Definition of the Chimera Object-Oriented Data Model.
J. Intell. Inf. Syst., 1998

Definition and Analysis of Index Organizations for Object-Oriented Database Systems.
Inf. Syst., 1998

Data Security.
Data Knowl. Eng., 1998

An Approach to Model and Query Event-Based Temporal Data.
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998

Extending the ODMG Object Model with Composite Objects.
Proceedings of the 1998 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1998

An Authorization Model and Its Formal Semantics.
Proceedings of the Computer Security, 1998

Towards Optimal Indexing for Segment Databases.
Proceedings of the Advances in Database Technology, 1998

Extending the ODMG Object Model with Time.
Proceedings of the ECOOP'98, 1998

Active-U-Datalog: Integrating Active Rules in a Logical Update Language.
Proceedings of the Transactions and Change in Logic Databases, 1998

Introducing External Functions in Constraint Query Languages.
Proceedings of the Principles and Practice of Constraint Programming, 1998

Data Security.
Proceedings of the COMPSAC '98, 1998

Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
Proceedings of the Application and Theory of Petri Nets 1998, 1998

1997
Information Flow Control in Object-Oriented Systems.
IEEE Trans. Knowl. Data Eng., 1997

Transactions and Updates in Deductive Databases.
IEEE Trans. Knowl. Data Eng., 1997

An Extended Authorization Model for Relational Databases.
IEEE Trans. Knowl. Data Eng., 1997

On Modeling Cost Functions for Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng., 1997

Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997

A Formal View of Object-Oriented Database Systems.
TAPOS, 1997

T_Chimera: A Temporal Object-Oriented Data Model.
TAPOS, 1997

Decentralized Administration for a Temporal Access Control Model.
Inf. Syst., 1997

Towards Optimal Two-Dimensional Indexing for Constraint Databases.
Inf. Process. Lett., 1997

A theoretical formulation for degrees of isolation in databases.
Information & Software Technology, 1997

Manipulating Spatial Data in Constraint Databases.
Proceedings of the Advances in Spatial Databases, 1997

Providing flexibility in information flow control for object oriented systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A Unified Framework for Enforcing Multiple Access Control Policies.
Proceedings of the SIGMOD 1997, 1997

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Trigger Inheritance and Overriding in Active Object Database Systems.
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997

Administration Policies in a Multipolicy Autorization System.
Proceedings of the Database Securty XI: Status and Prospects, 1997

A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Proceedings of the Database Securty XI: Status and Prospects, 1997

An Execution Model for Multilevel Seccure Workflows.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Integrity Constraint Checking in Chimera.
Proceedings of the Constraint Databases and Their Applications, 1997

Query Processing.
Multimedia Databases in Perspective, 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Advanced Transaction Models and Architectures, 1997

Indexing Techniques for Advanced Database Systems
Advances in Database Systems 8, Kluwer, ISBN: 0-7923-9985-4, 1997

1996
An Authorization Model for a Distributed Hypertext System.
IEEE Trans. Knowl. Data Eng., 1996

A Temporal Access Control Mechanism for Database Systems.
IEEE Trans. Knowl. Data Eng., 1996

Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996

On the Number of Descendants in an Object DAG.
Inf. Process. Lett., 1996

Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996

On Using Materialization Strategies for a Temporal Authorization Model.
VIEWS, 1996

Supporting Multiple Access Control Policies in Database Systems.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

A Formal Representation for State Diagrams in the OMT Methodology.
Proceedings of the SOFSEM '96: Theory and Practice of Informatics, 1996

A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996

Static Analysis of Intensional Databases in U-Datalog.
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996

A Graph-Theoretic Approach to Indexing in Object-Oriented Databases.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

A Formal Temporal Object-Oriented Data Model.
Proceedings of the Advances in Database Technology, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996

A Non-Timestamped Authorization Model for Data Management Systems.
Proceedings of the CCS '96, 1996

A Data Access Structure for Filtering Distance Queries in Image Retrieval.
Multimedia Database System: Issues and Research Direction, 1996

1995
Index Organizations for Object-Oriented Database Systems.
IEEE Trans. Knowl. Data Eng., 1995

Towards Deductice Object Databases.
TAPOS, 1995

An Extended Authorization Model for Object Databases.
Journal of Computer Security, 1995

Database Security: Research and Practice
Inf. Syst., 1995

Semantic Assumptions and Query Evaluation in Temporal Databases.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

Query Decomposition in an Object-Oriented Database System Distributed on a Local Area Network.
Proceedings of the Proceedings RIDE-DOM '95, Fifth International Workshop on Research Issues in Data Engineering, 1995

Research issues in authorization models for hypertext systems.
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995

Database Monitoring in U-Datalog.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995

Objects with Multiple Most Specific Classes.
Proceedings of the ECOOP'95, 1995

Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995

Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

Enhanced Nested-Inherited Index for OODBMS.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases.
Proceedings of the Constraint Databases and Applications, 1995

1994
Index Configuration in Object-Oriented Databases
VLDB J., 1994

Guest Editors' Introduction.
Distributed and Parallel Databases, 1994

Applications of Object-Oriented Technology to the Integration of Heterogeneous Database Systems.
Distributed and Parallel Databases, 1994

An Approach to Authorization Modeling in Object-Oriented Database Systems.
Data Knowl. Eng., 1994

Clustering Techniques in Object Bases: A Survey.
Data Knowl. Eng., 1994

Index Configurations in Object-Oriented Databases.
Proceedings of the TOOLS 1994: 13th International Conference on Technology of Object-Oriented Languages and Systems, 1994

Collecting garbage in multilevel secure object stores.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Transaction Optimization in Rule Databases.
Proceedings of the Fourth International Workshop on Research Issues in Data Engineering: Active Database Systems, 1994

Generic Methods in Deductive Object Databases.
OOIS, 1994

A discretionary access control model with temporal authorizations.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

On the Selection of Optimal Index Configuration in OO Databases.
Proceedings of the Tenth International Conference on Data Engineering, 1994

Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Proceedings of the Computer Security, 1994

Deductive Object Databases.
Proceedings of the Object-Oriented Programming, Proceedings of the 8th European Conference, 1994

Static Analysis of Transactional Intensional Databases.
Proceedings of the Workshop on Deductive Databases and Logic Programming, 1994

A new Authorization Model for Object-Oriented Databases.
Proceedings of the Database Security, 1994

Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994

A Temporal Authorization Model.
Proceedings of the CCS '94, 1994

A Bottom-Up Interpreter for a Database Language with Updates and Transactions.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
Access Control in Object-Oriented Database Systems - Some Approaches and Issues.
Proceedings of the Advanced Database Systems, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
Journal of Computer Security, 1993

Path-Index: An Approach to the Efficient Execution of Object-Oriented Queries.
Data Knowl. Eng., 1993

Achieving stricter correctness requirements in multilevel secure databases.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

An Advanced Information Management System.
Proceedings of the RIDE-IMS '93, 1993

Research Issues in Discretionary Authorizations for Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

Modeling Multilevel Entities Using Single Level Objects.
DOOD, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993

Queries, Constraints, Updates and Transactions Within a Logic-Based Language.
Proceedings of the CIKM 93, 1993

High Assurance Discretionary Access Control for Object Bases.
Proceedings of the CCS '93, 1993

Authorizations in Relational Database Management Systems.
Proceedings of the CCS '93, 1993

Formalizzazione e Ottimizzazione di Transazioni di modifica in CLP(AD).
Proceedings of the 8th Italian Conference on Logic Programming, 1993

Object-Oriented Database Systems
Addison-Wesley, ISBN: 0-201-62439-7, 1993

1992
Object-Oriented Query Languages: The Notion and the Issues.
IEEE Trans. Knowl. Data Eng., 1992

Query optimization by using knowledge about data semantics.
Data Knowl. Eng., 1992

An Approach to Support Method Invocations in Object-Oriented Queries.
Proceedings of the RIDE-TQP '92, 1992

Optimization of Object-Oriented Queries Using Path Indices.
Proceedings of the RIDE-TQP '92, 1992

An Analytical Model of Object-Oriented Query Costs.
Proceedings of the Persistent Object Systems, 1992

A Knowledge Based Information System.
Proceedings of the Personal Computers and Intelligent Systems, 1992

Data Hiding and Security in Object-Oriented Databases.
Proceedings of the Eighth International Conference on Data Engineering, 1992

Multimedia Data Handling in a Knowledge Representation System.
Future Databases, 1992

The ADKMS Knowledge Acquisition System.
Future Databases, 1992

Modelling Database Updates with Constraint Logic Programming.
Proceedings of the Modelling Database Dynamics, 1992

CLP(AD) as a Deductive Database Language with Updates.
Proceedings of the Extensions of Logic Programming, Third International Workshop, 1992

Towards a Logical-Object Oriented Programming Language for Databases.
Proceedings of the Advances in Database Technology, 1992

A View Mechanism for Object-Oriented Databases.
Proceedings of the Advances in Database Technology, 1992

Modeling Database Updates with Constraint Logic Programming.
Proceedings of the Workshop on Deductive Databases held in conjunction with the Joint International Conference and Symposium on Logic Programming, 1992

CLP (X) as a framework for action and deduction.
Proceedings of the CNKBS'92, 1992

An Approach to Integrate Multimedi Data in a Knowledge Representation System.
Proceedings of the Advanced Visual Interfaces - Proceedings of the International Workshop, 1992

Sistemi di basi di dati orientate agli oggetti - concetti e architetture.
Addison-Wesley, ISBN: 978-88-7192-036-8, 1992

1991
A Model of Authorization for Next-Generation Database Systems.
ACM Trans. Database Syst., 1991

Object-Oriented Database Management Systems: Concepts and Issues.
IEEE Computer, 1991

Integration of Heterogeneous Data Repositories by Using Object-Oriented Views.
Proceedings of the RIDE-IMS '91, 1991

An Indexing Technique for Object-Oriented Databases.
Proceedings of the Seventh International Conference on Data Engineering, 1991

Method precomputation in object-oriented databases.
Proceedings of the Conference on Organizational Computing Systems, 1991

A Survey of Indexing Techniques for Object-Oriented Database Management Systems.
Query Processing for Advanced Database Systems, Dagstuhl, 1991

1990
Optimization of Queries using Nested Indices.
Proceedings of the Advances in Database Technology, 1990

Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990

1989
Indexing Techniques for Queries on Nested Objects.
IEEE Trans. Knowl. Data Eng., 1989

Integration of heterogeneous database applications through an object-oriented interface.
Inf. Syst., 1989

Composite Objects Revisted.
Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, Portland, Oregon, May 31, 1989

1988
Query Processing in a Multimedia Document System.
ACM Trans. Inf. Syst., 1988

The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System.
Perform. Eval., 1988

Correctness of Semantic Integrity Checking in Database Management Systems.
Acta Inf., 1988

The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications.
Proceedings of the Advances in Object-Oriented Database Systems, 1988

Document query processing strategies: cost evaluation and heuristics.
Proceedings of the ACM SIGOIS and IEEECS TC-OA 1988 Conference on Office Information Systems, 1988

MULTOS: a Document Server for Distributed Office Systems.
Proceedings of the Advances in Database Technology, 1988

Views and Security in Distributed Database Management Systems.
Proceedings of the Advances in Database Technology, 1988

1987
An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems.
Comput. J., 1987

1986
Query Processing Based on Complex Object Types.
IEEE Database Eng. Bull., 1986

1984
Development of a Multimedia Information System for an Office Environment.
Proceedings of the Tenth International Conference on Very Large Data Bases, 1984

1983
View Management in Distributed Data Base Systems.
Proceedings of the 9th International Conference on Very Large Data Bases, October 31, 1983

Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases.
Proceedings of the Third Symposium on Reliability in Distributed Software and Database Systems, 1983

The Update Problem in the Distributed Database System Hermes/1.
ICOD, 1983

Distributed Database Design Using the Entity-Relationship Model.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

1982
R*: A Research Project on Distributed Relational DBMS.
IEEE Database Eng. Bull., 1982

1981
Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System.
Proceedings of the Trends in Information Processing Systems, 1981


  Loading...