Elisa Bertino
#38,059
Most Influential Person Now
American computer scientist, academic
Elisa Bertino's AcademicInfluence.com Rankings
Elisa Bertinocomputer-science Degrees
Computer Science
#1660
World Rank
#1719
Historical Rank
Information Security
#3
World Rank
#3
Historical Rank
Database
#200
World Rank
#207
Historical Rank

Download Badge
Computer Science
Elisa Bertino's Degrees
- PhD Computer Science Consorzio ICoN
- Masters Computer Science Consorzio ICoN
- Bachelors Computer Science Consorzio ICoN
Similar Degrees You Can Earn
Why Is Elisa Bertino Influential?
(Suggest an Edit or Addition)According to Wikipedia, Elisa Bertino is a professor of computer science at Purdue University and is acting as the research director of CERIAS, the Center for Education and Research in Information Assurance and Security, an institute attached to Purdue University. Bertino's research interest include data privacy and computer security.
Elisa Bertino's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- State-of-the-art in privacy preserving data mining (2004) (970)
- TRBAC: a temporal role-based access control model (2000) (904)
- A generalized temporal role-based access control model (2005) (648)
- The specification and enforcement of authorization constraints in workflow management systems (1999) (593)
- Association rule hiding (2004) (576)
- Disclosure limitation of sensitive rules (1999) (500)
- GEO-RBAC: a spatially aware RBAC (2005) (487)
- Database security - concepts, approaches, and challenges (2005) (476)
- Botnets and Internet of Things Security (2017) (468)
- A model of authorization for next-generation database systems (1991) (388)
- Quality Control in Crowdsourcing Systems: Issues and Directions (2013) (382)
- Preserving User Location Privacy in Mobile Data Management Infrastructures (2006) (373)
- Secure and selective dissemination of XML documents (2002) (364)
- Hiding Association Rules by Using Confidence and Support (2001) (344)
- A unified framework for enforcing multiple access control policies (1997) (330)
- Efficient k -Anonymization Using Clustering Techniques (2007) (326)
- Composite objects revisited (1989) (317)
- Privacy-Aware Role-Based Access Control (2007) (316)
- Purpose based access control of complex data for privacy protection (2005) (285)
- Internet of Things (IoT) (2016) (281)
- Indexing Techniques for Queries on Nested Objects (1989) (264)
- Trust-X: A Peer-to-Peer Framework for Trust Establishment (2004) (259)
- An access control model supporting periodicity constraints and temporal reasoning (1998) (255)
- A View Mechanism for Object-Oriented Databases (1992) (253)
- Securing XML Documents with Author-X (2001) (238)
- A Trust-Based Context-Aware Access Control Model for Web-Services (2004) (237)
- Specifying and enforcing access control policies for XML document sources (2000) (222)
- Detecting anomalous access patterns in relational databases (2008) (220)
- Secure interoperation in a multidomain environment employing RBAC policies (2005) (216)
- Provenance-based trustworthiness assessment in sensor networks (2010) (213)
- A Framework for Evaluating Privacy Preserving Data Mining Algorithms* (2005) (213)
- Privacy Preserving Policy-Based Content Sharing in Public Clouds (2013) (210)
- Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks (2015) (207)
- Secure Anonymization for Incremental Datasets (2006) (206)
- Privacy preserving schema and data matching (2007) (201)
- Privacy-preserving Digital Identity Management for Cloud Computing (2009) (184)
- Mining roles with semantic meanings (2008) (184)
- Object-Oriented Database Systems (1993) (179)
- Access-control language for multidomain environments (2004) (178)
- Object-oriented database management systems: concepts and issues (1991) (176)
- Privacy-Preserving and Content-Protecting Location Based Queries (2012) (175)
- Privacy preserving multi-factor authentication with biometrics (2006) (174)
- Object-Oriented Query Languages: The Notion and the Issues (1992) (173)
- Advances in Database Technology — EDBT 2002 (2002) (170)
- A logical framework for reasoning about access control models (2001) (168)
- X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control (2005) (165)
- A Survey of Quantification of Privacy Preserving Data Mining Algorithms (2008) (165)
- End-User Privacy in Human – Computer Interaction (2009) (164)
- Effective Key Management in Dynamic Wireless Sensor Networks (2015) (163)
- Intrusion detection in RBAC-administered databases (2005) (163)
- Private record matching using differential privacy (2010) (162)
- An Approach to Evaluate Data Trustworthiness Based on Data Provenance (2008) (161)
- Selective and authentic third-party distribution of XML documents (2004) (161)
- Privacy and ownership preserving of outsourced medical data (2005) (159)
- Object-Oriented Database Systems: Concepts and Architectures (1993) (154)
- Detecting mobile malware threats to homeland security through static analysis (2014) (151)
- Watermarking Relational Databases Using Optimization-Based Techniques (2008) (151)
- A flexible authorization mechanism for relational data management systems (1999) (150)
- Homomorphic Encryption and Applications (2014) (145)
- A logical framework for reasoning about access control models (2003) (145)
- Indexing Techniques for Advanced Database Systems (1997) (143)
- LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE (2018) (143)
- The PROBE Framework for the Personalized Cloaking of Private Locations (2010) (143)
- Big Data - Security and Privacy (2015) (142)
- Collaboration in multicloud computing environments: Framework and security issues (2013) (140)
- A Temporal Access Control Mechanism for Database Systems (1996) (136)
- Risk-based access control systems built on fuzzy inferences (2010) (134)
- A Content-Based Authorization Model for Digital Libraries (2002) (133)
- Security for Web Services and Service-Oriented Architectures (2009) (130)
- Preventing velocity-based linkage attacks in location-aware applications (2009) (129)
- PARALLEL AND DISTRIBUTED SYSTEMS (2010) (129)
- A privacy-preserving approach to policy-based content dissemination (2010) (129)
- On specifying security policies for web documents with an XML-based language (2001) (129)
- An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds (2014) (128)
- Supporting multiple access control policies in database systems (1996) (127)
- An Extended Authorization Model for Relational Databases (1997) (127)
- Computer Security — ESORICS 96 (1996) (127)
- A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications (2004) (126)
- Query processing in a multimedia document system (1988) (125)
- Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things (2017) (124)
- Robust Multi-Factor Authentication for Fragile Communications (2014) (122)
- Secure knowledge management: confidentiality, trust, and privacy (2006) (118)
- A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems (1997) (117)
- XACML Policy Integration Algorithms (2008) (116)
- Differentially Private K-Means Clustering (2015) (116)
- XML-based specification for Web services document security (2004) (114)
- Security Analysis of the SASI Protocol (2009) (112)
- Access control policy combining: theory meets practice (2009) (111)
- Using Anonymized Data for Classification (2009) (111)
- Temporal hierarchies and inheritance semantics for GTRBAC (2002) (108)
- A Hybrid Approach to Private Record Linkage (2008) (107)
- Identity Management: Concepts, Technologies, and Systems (2010) (104)
- A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing (2008) (101)
- An obligation model bridging access control policies and privacy policies (2008) (101)
- An algebra for fine-grained integration of XACML policies (2009) (101)
- Establishing and protecting digital identity in federation systems (2005) (100)
- A Critique of the ANSI Standard on Role-Based Access Control (2007) (100)
- A roadmap for comprehensive online privacy policy management (2007) (97)
- Mining Roles with Multiple Objectives (2010) (97)
- On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (2007) (96)
- Trust negotiations: concepts, systems, and languages (2004) (95)
- ECOOP 2000 — Object-Oriented Programming (2000) (94)
- Privacy-Preserving Detection of Sensitive Data Exposure (2015) (94)
- Supporting RBAC with XACML+OWL (2009) (93)
- Anonymous Geo-Forwarding in MANETs through Location Cloaking (2008) (93)
- Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information (2019) (92)
- Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy (2016) (92)
- An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting (2008) (92)
- Access Control for Databases: Concepts and Systems (2011) (91)
- Access Control in Dynamic XML-Based Web-Services with X-RBAC (2003) (91)
- Information Flow Control in Object-Oriented Systems (1997) (85)
- Intelligent Database Systems (2000) (85)
- Privacy-aware role-based access control (2010) (85)
- An Authorization Model for a Distributed Hypertext System (1996) (84)
- An indexing techniques for object-oriented databases (1991) (83)
- Practical k nearest neighbor queries with location privacy (2014) (83)
- A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations (2010) (82)
- Controlled access and dissemination of XML documents (1999) (82)
- Privacy Preserving Delegated Access Control in Public Clouds (2014) (81)
- Access Control and Authorization Constraints for WS-BPEL (2006) (80)
- Efficient privacy preserving content based publish subscribe systems (2012) (80)
- Trust Negotiation in Identity Management (2007) (80)
- Context-Based Access Control Systems for Mobile Devices (2015) (79)
- A Security Punctuation Framework for Enforcing Access Control on Streaming Data (2008) (79)
- An Access Control Language for a General Provenance Model (2009) (79)
- Single-Database Private Information Retrieval from Fully Homomorphic Encryption (2013) (78)
- Providing flexibility in information flow control for object oriented systems (1997) (78)
- Author-X: A Java-Based System for XML Data Protection (2000) (76)
- A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks (2011) (76)
- A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model (2013) (76)
- Efficient systematic clustering method for k-anonymization (2011) (75)
- Privacy of outsourced k-means clustering (2014) (75)
- Temporal Synchronization Models for Multimedia Data (1998) (75)
- Integrating XML and databases (2001) (75)
- An approach to evaluate policy similarity (2007) (74)
- PP-trust-X: A system for privacy preserving trust negotiations (2007) (73)
- RWGuard: A Real-Time Detection System Against Cryptographic Ransomware (2018) (73)
- Secure Provenance Transmission for Streaming Data (2013) (72)
- EXAM: a comprehensive environment for the analysis of access control policies (2010) (72)
- Data Security and Privacy in the IoT (2016) (72)
- A Secure Communication Protocol for Drones and Smart Objects (2015) (71)
- Integration of heterogeneous data repositories by using object-oriented views (1991) (71)
- Secure kNN Query Processing in Untrusted Cloud Environments (2014) (71)
- Profiling Database Application to Detect SQL Injection Attacks (2007) (70)
- /spl Xscr/-TNL: an XML-based language for trust negotiations (2003) (68)
- Heimdall: Mitigating the Internet of Insecure Things (2017) (68)
- Collusion Detection in Online Rating Systems (2013) (68)
- Privacy-Preserving Association Rule Mining in Cloud Computing (2015) (68)
- D-algebra for composing access control policy decisions (2009) (67)
- Database Security: Research and Practice (1995) (67)
- A logical framework for reasoning on data access control policies (1999) (67)
- Achieving privacy in trust negotiations with an ontology-based approach (2006) (67)
- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks (2013) (66)
- Towards privacy preserving access control in the cloud (2011) (66)
- Secure collaboration in mediator-free environments (2005) (65)
- Dependencies and separation of duty constraints in GTRBAC (2003) (65)
- Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications (2011) (64)
- On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques (2016) (64)
- Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection (2010) (64)
- XML and Data Integration (2001) (63)
- Reputation management in crowdsourcing systems (2012) (63)
- Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions (2012) (63)
- Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures (2019) (62)
- Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach (2011) (62)
- A temporal key management scheme for secure broadcasting of XML documents (2002) (62)
- Conditional Privacy-Aware Role Based Access Control (2007) (62)
- 5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol (2019) (62)
- Objects with Multiple Most Specific Classes (1995) (61)
- Enforcing spatial constraints for mobile RBAC systems (2010) (60)
- Towards a Logical Model for Patterns (2003) (60)
- Authorizations in relational database management systems (1993) (59)
- XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! (2006) (59)
- Privacy preserving delegated access control in the storage as a service model (2012) (59)
- A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks (2015) (58)
- Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases (1992) (58)
- Preserving privacy of feedback providers in decentralized reputation systems (2012) (58)
- Efficient privacy-aware record integration (2013) (57)
- Privacy-Preserving Database Systems (2005) (57)
- A Formal Temporal Object-Oriented Data Model (1996) (56)
- Integration of heterogeneous database applications through an object-oriented interface (1989) (56)
- RBAC models - concepts and trends (2003) (56)
- Using automated individual white-list to protect web digital identities (2012) (56)
- Robust and Universal Seamless Handover Authentication in 5G HetNets (2019) (55)
- Index Organizations for Object-Oriented Database Systems (1995) (55)
- A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks (2012) (55)
- Access control enforcement for conversation-based web services (2006) (55)
- Fine-grained role-based delegation in presence of the hybrid role hierarchy (2006) (54)
- A conditional purpose-based access control model with dynamic roles (2011) (54)
- Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper (2011) (54)
- A multigranular object‐oriented framework supporting spatio‐temporal granularity conversions (2006) (53)
- A temporal authorization model (1994) (53)
- An Access-Control Framework for WS-BPEL (2008) (53)
- A multigranular spatiotemporal data model (2003) (53)
- A hierarchical access control model for video database systems (2003) (51)
- X-GTRBAC admin: a decentralized administration model for enterprise wide access control (2004) (51)
- Poster: towards attribute based group key management (2011) (51)
- A formal model of views for object-oriented database systems (1997) (51)
- An access control model for video database systems (2000) (51)
- Big Data for Open Digital Innovation - A Research Roadmap (2015) (50)
- Building access control policy model for privacy preserving and testing policy conflicting problems (2014) (50)
- SERAT: SEcure role mApping technique for decentralized secure interoperability (2005) (50)
- The SCIFC Model for Information Flow Control in Web Service Composition (2009) (50)
- Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications (2017) (50)
- Measuring the structural similarity among XML documents and DTDs (2008) (49)
- An Authorization Model and Its Formal Semantics (1998) (49)
- Data Transparency with Blockchain and AI Ethics (2019) (49)
- Mechanisms for database intrusion detection and response (2008) (49)
- Protecting location privacy against spatial inferences: the PROBE approach (2009) (49)
- A Collaborative DDoS Defence Framework Using Network Function Virtualization (2017) (49)
- Privacy-Preserving Updates to Anonymous and Confidential Databases (2011) (48)
- Multi-domain and privacy-aware role based access control in eHealth (2008) (47)
- Privacy-preserving incremental data dissemination (2009) (47)
- Protecting outsourced data in cloud computing through access management (2016) (47)
- Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings (2008) (47)
- Challenges and Opportunities with Big Data 2011-1 (2011) (47)
- A Hybrid Technique for Private Location-Based Queries with Database Protection (2009) (47)
- An integrated approach to federated identity and privilege management in open systems (2007) (46)
- PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones (2018) (46)
- FENCE: Continuous access control enforcement in dynamic data stream environments (2010) (46)
- Security and privacy in social networks (2017) (45)
- Design and Implementation of an Intrusion Response System for Relational Databases (2011) (45)
- Policy decomposition for collaborative access control (2008) (45)
- Collaborative Commerce and Knowledge Management (2002) (44)
- Continuous Intersection Joins Over Moving Objects (2008) (44)
- A Lightweight Secure Provenance Scheme for Wireless Sensor Networks (2012) (44)
- A novel approach for privacy-preserving video sharing (2005) (44)
- Structural signatures for tree data structures (2008) (44)
- An Extended Algebra for Constraint Databases (1998) (44)
- Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges (2006) (44)
- Dictionary Based Secure Provenance Compression for Wireless Sensor Networks (2016) (44)
- A Similarity Measure for Comparing XACML Policies (2013) (44)
- Data hiding and security in object-oriented databases (1992) (43)
- Protection and administration of XML data sources (2002) (43)
- Formal foundations for hybrid hierarchies in GTRBAC (2008) (43)
- Prox-RBAC: a proximity-based spatially aware RBAC (2011) (43)
- Analysis of privacy and security policies (2009) (43)
- Modeling and language support for the management of pattern-bases (2004) (42)
- An Approach to Authorization Modeling in Object-Oriented Database Systems (1994) (42)
- A system to specify and manage multipolicy access control models (2002) (42)
- Attribute Based Group Key Management (2014) (41)
- Blockchain-Based PKI Solutions for IoT (2018) (41)
- Privacy-Preserving and Outsourced Multi-user K-Means Clustering (2014) (41)
- Manipulating Spatial Data in Constraint Databases (1997) (41)
- A role-involved purpose-based access control model (2012) (41)
- High assurance discretionary access control for object bases (1993) (41)
- An analysis of expressiveness and design issues for the generalized temporal role-based access control model (2005) (40)
- A risk management approach to RBAC (2009) (40)
- Collaborative Computing: Networking, Applications and Worksharing (2009) (40)
- Automating role-based provisioning by learning from examples (2009) (40)
- Security and privacy for geospatial data: concepts and research directions (2008) (40)
- Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks (2013) (40)
- Privacy Preserving User-Based Recommender System (2017) (40)
- Generalized Temporal Role Based Access Control Model (GTRBAC) Part I Specification and Modeling (2001) (39)
- How to authenticate graphs without leaking (2010) (39)
- PDL with preferences (2005) (39)
- Views and Security in Distributed Database Management Systems (1988) (39)
- Path-Index: An Approach to the Efficient Execution of Object-Oriented Queries (1993) (39)
- Query Processing (1997) (39)
- The Design and Evaluation of Accountable Grid Computing System (2009) (39)
- Privacy-Preserving Trust Negotiations (2004) (39)
- Data Protection from Insider Threats (2012) (39)
- Development of a Multimedia Information System for an Office Environment (1984) (38)
- A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy) (2006) (38)
- EFFICIENT K-ANONYMITY USING CLUSTERING TECHNIQUE (2006) (38)
- Privacy-preserving authentication of trees and graphs (2013) (38)
- Securing XML data in third-party distribution systems (2005) (38)
- Privacy Preserving Context Aware Publish Subscribe Systems (2013) (38)
- Hybrid role hierarchy for generalized temporal role based access control model (2002) (38)
- IdentiDroid: Android can finally Wear its Anonymous Suit (2014) (38)
- Extending the ODMG Object Model with Time (1998) (37)
- Efficient and accurate strategies for differentially-private sliding window queries (2013) (37)
- Optimization of Queries using Nested Indices (1990) (37)
- Password policy simulation and analysis (2007) (37)
- DECHO—a framework for the digital exploration of cultural heritage objects (2011) (37)
- Exception-based information flow control in object-oriented systems (1998) (37)
- An authorization model for geographical maps (2004) (36)
- A New Model for Secure Dissemination of XML Content (2008) (36)
- Towards a Logical-Object Oriented Programming Language for Databases (1992) (36)
- Generative policy model for autonomic management (2017) (36)
- DBMask: Fine-Grained Access Control on Encrypted Relational Databases (2015) (36)
- Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation (2020) (36)
- Android resource usage risk assessment using hidden Markov model and online learning (2017) (36)
- X-FEDERATE: a policy engineering framework for federated access management (2006) (35)
- DetAnom: Detecting Anomalous Database Transactions by Insiders (2015) (35)
- A Semantic-Based Execution Model for Multilevel Secure Workflows (2000) (35)
- Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices (2017) (35)
- Insecure connection bootstrapping in cellular networks: the root of all evil (2019) (34)
- An Execution Model for Multilevel Seccure Workflows (1997) (34)
- Proceedings of the 20th international conference on World wide web (2011) (34)
- Secure data provenance compression using arithmetic coding in wireless sensor networks (2014) (34)
- Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization (2017) (34)
- Access control for XML documents and data (2004) (34)
- StreamShield: a stream-centric approach towards security and privacy in data stream environments (2009) (33)
- Demonstrating a lightweight data provenance for sensor networks (2012) (33)
- Challenges of Testing Web Services and Security in SOA Implementations (2007) (33)
- DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts (2017) (33)
- FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria (2020) (33)
- Privacy-aware role based access control (2009) (32)
- Cryptanalysis of Some RFID Authentication Protocols (2008) (32)
- Data Security and Privacy: Concepts, Approaches, and Research Directions (2016) (32)
- Access Control in Object-Oriented Database Systems - Some Approaches and Issues (1993) (32)
- A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization (2014) (32)
- MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations (2000) (32)
- A roadmap for privacy-enhanced secure data provenance (2014) (31)
- Advances in Spatial and Temporal Databases, 9th International Symposium, SSTD 2005, Angra dos Reis, Brazil, August 22-24, 2005, Proceedings (2005) (31)
- A fine-grained access control model for Web services (2004) (31)
- Transactions and Updates in Deductive Databases (1997) (31)
- PROBE: An Obfuscation System for the Protection of Sensitive Location Information in LBS (2008) (31)
- TRBAC : A temporal role-based access control (2001) (31)
- Ws-AC: A Fine Grained Access Control System for Web Services (2006) (30)
- A comprehensive simulation tool for the analysis of password policies (2009) (30)
- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (2009) (30)
- Data Trustworthiness - Approaches and Research Challenges (2014) (30)
- P-Hera: scalable fine-grained access control for P2P infrastructures (2005) (30)
- Multi-route query processing and optimization (2013) (30)
- Location-based access control systems for mobile users: concepts and research directions (2011) (30)
- X-gtrbac admin: A decentralized administration model for enterprise-wide access control (2005) (30)
- T_Chimera: A Temporal Object-Oriented Data Model (1997) (30)
- Securing XML documents: the author-X project demonstration (2001) (30)
- Privacy-Preserving Enforcement of Spatially Aware RBAC (2012) (29)
- Data Management in RFID Applications (2007) (29)
- Policy-Driven Service Composition with Information Flow Control (2010) (29)
- Highly efficient randomized authentication in VANETs (2018) (29)
- Role Based Access Control Models (2001) (29)
- Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (1996) (29)
- Extending the ODMG object model with composite objects (1998) (29)
- Policy framework for security and privacy management (2009) (29)
- Method precomputation in object-oriented databases (1991) (29)
- Fine-grained integration of access control policies (2011) (29)
- Fine-Grained Analysis of Packet Loss in MANETs (2017) (29)
- An Indexing Technique for Object-Oriented Databases (1991) (29)
- A Security Framework for a Drone Delivery Service (2016) (29)
- Semantic assumptions and query evaluation in temporal databases (1995) (28)
- Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data (2014) (28)
- Protecting Location Privacy through Semantics-aware Obfuscation Techniques (2008) (28)
- Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning (2019) (28)
- Position transformation: a location privacy protection method for moving objects (2008) (28)
- Location Privacy in Moving-Object Environments (2009) (28)
- Data security in location-aware applications: an approach based on RBAC (2007) (28)
- Index configuration in object-oriented databases (1994) (28)
- Leakage-free redactable signatures (2012) (28)
- On the selection of optimal index configuration in OO databases (1994) (28)
- On the Complexity of Authorization in RBAC under Qualification and Security Constraints (2011) (27)
- Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study (2005) (27)
- Access control, confidentiality and privacy for video surveillance databases (2006) (27)
- Security-Aware Service Composition with Fine-Grained Information Flow Control (2013) (27)
- Advanced Transaction Processing in Multilevel Secure File Stores (1998) (27)
- Methods and Tools for Policy Analysis (2019) (27)
- On practical specification and enforcement of obligations (2012) (27)
- An access control system for a Web map management service (2004) (27)
- User Tasks and Access Control overWeb Services (2007) (26)
- On Modeling Cost Functions for Object-Oriented Databases (1997) (26)
- MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles (2015) (26)
- GEO-RBAC (2007) (26)
- A Framework for Data Mining Pattern Management (2004) (26)
- pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT (2016) (26)
- Access Control Policy Analysis and Visualization Tools for Security Professionals (2008) (26)
- A nested transaction model for multilevel secure database management systems (2001) (26)
- A formal proximity model for RBAC systems (2012) (25)
- Secure Dissemination of XML Content Using Structure-based Routing (2006) (25)
- Privacy Preserving Location-Aware Personalized Web Service Recommendations (2018) (25)
- Self-tuning query mesh for adaptive multi-route query processing (2009) (25)
- Adaptive data protection in distributed systems (2013) (25)
- Privacy-preserving matching of spatial datasets with protection against background knowledge (2010) (25)
- A Survey of Indexing Techniques for Object-Oriented Database Management Systems (1991) (25)
- Preface (1994) (25)
- Directions for Web and e-commerce applications security (2001) (25)
- Interdependent Security Risk Analysis of Hosts and Flows (2015) (25)
- Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part II (2020) (25)
- A new Authorization Model for Object-Oriented Databases (1994) (24)
- Decentralized Public Key Infrastructure for Internet-of-Things (2018) (24)
- Private Searching on Streaming Data Based on Keyword Frequency (2014) (24)
- Temporal Authorization Bases: From Specification to Integration (2000) (24)
- Achieving K-anonymity in mobile ad hoc networks (2005) (24)
- A Logic-Based Approach for Enforcing Access Control (2000) (24)
- Modeling Spatio-Temporal Constraints for Multimedia Objects (1999) (24)
- PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project (2003) (24)
- Practical privacy-preserving user profile matching in social networks (2016) (24)
- A Characterization of the problem of secure provenance management (2009) (24)
- Evolving a Set of DTDs According to a Dynamic Set of XML Documents (2002) (24)
- Kinesis: a security incident response and prevention system for wireless sensor networks (2014) (24)
- Deductive Object Databases (1994) (24)
- A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection (2017) (24)
- Scalable end-to-end security for advanced metering infrastructures (2015) (23)
- E-Spion: A System-Level Intrusion Detection System for IoT Devices (2019) (23)
- Real-Time Digital Signatures for Time-Critical Networks (2017) (23)
- Provenance for Wireless Sensor Networks: A Survey (2016) (23)
- Memory Safety for Embedded Devices with nesCheck (2017) (23)
- Access control management in a distributed environment supporting dynamic collaboration (2005) (23)
- Pareto Optimal Security Resource Allocation for Internet of Things (2017) (23)
- An authorization system for digital libraries (2002) (23)
- Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions (1997) (23)
- Data and syntax centric anomaly detection for relational databases (2016) (23)
- Representation and querying of unfair evaluations in social rating systems (2014) (23)
- Assuring Data Trustworthiness - Concepts and Research Challenges (2010) (23)
- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk (2006) (23)
- An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks (2007) (23)
- A file provenance system (2013) (23)
- A Data Driven Approach for the Science of Cyber Security: Challenges and Directions (2016) (23)
- A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions (2017) (22)
- Access Control Model Extensions to Support Data Privacy Protection based on GDPR (2019) (22)
- The Challenge of Assuring Data Trustworthiness (2009) (22)
- An approach to model and query event-based temporal data (1998) (22)
- Data privacy for IoT systems: Concepts, approaches, and research directions (2016) (22)
- Automatic Compliance of Privacy Policies in Federated Digital Identity Management (2006) (22)
- No one can track you: Randomized authentication in Vehicular Ad-hoc Networks (2017) (22)
- Challenges and Opportunities with Big Data 2012-2 (2011) (22)
- Improving Scalability of Software Cloud for Composite Web Services (2009) (22)
- Android malicious application detection using support vector machine and active learning (2017) (22)
- Trigger Inheritance and Overriding in an Active Object Database System (2000) (22)
- Encryption key management for secure communication in smart advanced metering infrastructures (2013) (22)
- A Hybrid Approach to Private Record Matching (2012) (22)
- Private Updates to Anonymous Databases (2006) (22)
- A secure multiparty computation privacy preserving OLAP framework over distributed XML data (2010) (22)
- Elliptic Curve Cryptography based Certificateless Hybrid Signcryption Scheme without Pairing (2013) (21)
- Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses (2020) (21)
- SINE: Cache-friendly integrity for the web (2009) (21)
- Big Data -- Opportunities and Challenges Panel Position Paper (2013) (21)
- Modeling Multilevel Entities Using Single Level Objects (1993) (21)
- Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems (2006) (21)
- Publishing Time-Series Data under Preservation of Privacy and Distance Orders (2010) (21)
- Access Control and Privacy in Location-Aware Services forMobile Organizations (2006) (21)
- Sensor Network Provenance Compression Using Dynamic Bayesian Networks (2017) (21)
- Data security (1998) (21)
- An Approach to Classify Semi-structured Objects (1999) (20)
- Security for Web Services: Standards and Research Issues (2009) (20)
- End-to-end accountability in grid computing systems for coalition information sharing (2008) (20)
- Redefining Data Transparency: A Multidimensional Approach (2019) (20)
- A Service-Oriented Approach to Security--Concepts and Issues (2007) (20)
- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies (2007) (20)
- Representing and Learning Grammars in Answer Set Programming (2019) (20)
- Research Direction in Query Optimization at the University of Maryland. (1982) (20)
- Merkle Tree Authentication in UDDI Registries (2004) (20)
- Multiparty privacy protection for electronic health records (2013) (20)
- Private searching for single and conjunctive keywords on streaming data (2011) (20)
- Efficient tree pattern queries on encrypted XML documents (2013) (20)
- An Adaptive Access Control Model for Web Services (2006) (20)
- Distributed and Parallel Database Object Management (2012) (19)
- Information Driven Evaluation of Data Hiding Algorithms (2005) (19)
- Marlin: Mitigating Code Reuse Attacks Using Code Randomization (2015) (19)
- DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices (2015) (19)
- Trust establishment in the formation of Virtual Organizations (2008) (19)
- A System for Response and Prevention of Security Incidents in Wireless Sensor Networks (2016) (19)
- Definition and Analysis of Index Organizations for Object-Oriented Database Systems (1998) (19)
- Applying Data Mining Techniques to Wafer Manufacturing (1999) (19)
- A Controlled Access to Spatial Data on Web (2004) (19)
- Multifactor Identity Verification Using Aggregated Proof of Knowledge (2010) (19)
- The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications (1988) (19)
- Authorization and User Failure Resiliency for WS-BPEL Business Processes (2008) (18)
- Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap (2021) (18)
- Specification and enforcement of flexible security policy for active cooperation (2008) (18)
- Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations (2007) (18)
- An infrastructure for managing secure update operations on XML data (2003) (18)
- A constraint-based approach to shape management in multimedia databases (1998) (18)
- Approach to Supporting Continuity of Usage in Location-Based Access Control (2008) (18)
- A framework for contractual resource sharing in coalitions (2004) (18)
- Web Services Threats, Vulnerabilities, and Countermeasures (2009) (18)
- Multi-granular Spatio-temporal Object Models: Concepts and Research Directions (2009) (18)
- An Interoperable Approach to Multifactor Identity Verification (2009) (18)
- A Role-Involved Conditional Purpose-Based Access Control Model (2010) (18)
- Android User Privacy Preserving Through Crowdsourcing (2018) (18)
- ID-Based Two-Server Password-Authenticated Key Exchange (2014) (18)
- A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics (2017) (18)
- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure (2008) (18)
- Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases (2018) (18)
- Optimization of object-oriented queries using path indices (1992) (18)
- Efficient hierarchical key generation and key diffusion for sensor networks (2005) (18)
- xfACL: an extensible functional language for access control (2011) (18)
- View Management in Distributed Data Base Systems (1983) (17)
- A theoretical formulation for degrees of isolation in databases (1997) (17)
- A ROADMAP FOR COMPREHENSIVE ONLINE PRIVACY POLICY (2004) (17)
- An Authorization Model for Supporting the Speciication and Enforcement of Authorization Constraints in Workkow Management Systems (1999) (17)
- Privacy Techniques for Edge Computing Systems (2019) (17)
- Efficient integration of fine-grained access control in large-scale grid services (2005) (17)
- A hybrid private record linkage scheme: Separating differentially private synopses from matching records (2015) (17)
- Active-U-Datalog: Integrating Active Rules in a Logical Update Language (1996) (17)
- Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems (2008) (17)
- A General Framework for Web Content Filtering (2010) (17)
- Elimination of Subjectivity from Trust Recommendation (2009) (17)
- Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings (2009) (17)
- How Deep Learning Is Making Information Security More Intelligent (2019) (17)
- A graph-theoretic approach to indexing in object-oriented databases (1996) (17)
- MaX: an access control system for digital libraries and the Web (2002) (16)
- Efficient Leakage-free Authentication of Trees, Graphs and Forests (2012) (16)
- Web Content Filtering (2006) (16)
- POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures (2014) (16)
- Towards deductive object databases (1995) (16)
- T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management (2003) (16)
- Assessing the trustworthiness of location data based on provenance (2009) (16)
- The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System (1988) (16)
- Security in SOA and Web Services (2006) (16)
- ACConv -- An Access Control Model for Conversational Web Services (2011) (16)
- Data Security - Challenges and Research Opportunities (2013) (16)
- Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey (2022) (16)
- Research issues in data provenance for streaming environments (2009) (16)
- Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses (2017) (16)
- The Challenge of Access Control Policies Quality (2018) (16)
- Towards supporting fine-grained access control for Grid resources (2004) (16)
- TIUPAM: A Framework for Trustworthiness-Centric Information Sharing (2009) (16)
- Research Issues in Discretionary Authorizations for Object Bases (1993) (16)
- A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy (2007) (16)
- Privacy-Preserving User Profile Matching in Social Networks (2020) (16)
- Location-Aware Authentication and Access Control Concepts and Issues (2009) (16)
- Identity-based long running negotiations (2008) (16)
- Systematic clustering method for l-diversity model (2010) (16)
- Advances in Database Technology - EDBT 2004 (2004) (16)
- A Distributed System for The Management of Fine-grained Provenance (2015) (16)
- ID2S Password-Authenticated Key Exchange Protocols (2016) (16)
- Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy (2019) (16)
- Clustering Techniques in Object Bases: A Survey (1994) (16)
- Minimal credential disclosure in trust negotiations (2008) (16)
- Querying multiple temporal granularity data (2000) (15)
- Local Closed-World Assumptions for reasoning about Semantic Web data (2003) (15)
- Fine-grained analysis of packet losses in wireless sensor networks (2014) (15)
- A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks (2013) (15)
- Modeling Database Updates with Constraint Logic Programming (1992) (15)
- Collecting garbage in multilevel secure object stores (1994) (15)
- Securing DBMS: Characterizing and Detecting Query Floods (2004) (15)
- Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios (2017) (15)
- Tagging Stream Data for Rich Real-Time Services (2009) (15)
- A Comprehensive Model for Provenance (2012) (15)
- Group-Based Negotiations in P2P Systems (2010) (15)
- High-Assurance Integrity Techniques for Databases (2008) (15)
- Polisma - A Framework for Learning Attribute-Based Access Control Policies (2020) (15)
- Techniques to Combat Drift in PUF-based Authentication Systems (2010) (15)
- A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations (2005) (15)
- Policy Mapper: Administering Location-Based Access-Control Policies (2008) (15)
- Context-Aware Adaptation of Access-Control Policies (2008) (15)
- Administration Policies in a Multipolicy Autorization System (1997) (15)
- Trust Evaluation of Data Provenance (2008) (15)
- An advanced commit protocol for MLS distributed database systems (1996) (15)
- Self-Generation of Access Control Policies (2018) (15)
- Towards a Privacy-Aware Quantified Self Data Management Framework (2018) (15)
- Privacy-Preserving Filtering and Covering in Content-Based Publish Subscribe Systems (2009) (15)
- PostgreSQL anomalous query detector (2013) (15)
- Responding to Anomalous Database Requests (2008) (15)
- Multigranular spatio-temporal models: implementation challenges (2008) (14)
- Systematic control and management of data integrity (2006) (14)
- Guest Editors' Introduction: Data Quality in the Internet Era (2010) (14)
- Towards a Language for Pattern Manipulation and Querying (2004) (14)
- Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks (2015) (14)
- Biometrics-based identifiers for digital identity management (2010) (14)
- Privacy-Preserving Fine-Grained Access Control in Public Clouds (2012) (14)
- Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks (2010) (14)
- Digital Identity Management and Trust Negotiation (2009) (14)
- An empirical study of SMS one-time password authentication in Android apps (2019) (14)
- Handling Expiration of Multigranular Temporal Objects (2004) (14)
- Supporting Delegation in Secure Workflow Management Systems (2003) (14)
- Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models (2022) (14)
- Towards Optimal Two-Dimensional Indexing for Constraint Databases (1997) (14)
- A reference framework for integrating multiple representations of geographical maps (2003) (14)
- Towards Optimal Indexing for Segment Databases (1998) (14)
- Detection of Temporal Insider Threats to Relational Databases (2017) (14)
- An Analytical Model of Object-Oriented Query Costs (1992) (14)
- A Formal View of Object-Oriented Database Systems (1997) (13)
- Extended RBAC with Role Attributes (2006) (13)
- A Data-Driven Evaluation for Insider Threats (2016) (13)
- A dynamic key management solution to access hierarchy (2007) (13)
- Security of graph data: hashing schemes and definitions (2014) (13)
- A Flexible Approach to Multisession Trust Negotiations (2012) (13)
- Trustworthy Information: Concepts and Mechanisms (2010) (13)
- A Conditional Role-Involved Purpose-Based Access Control Model (2011) (13)
- Workflow authorisation in mediator-free environments (2006) (13)
- Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data (2015) (13)
- A Uniied Framework for Enforcing Multiple Access Control Policies (1997) (13)
- AGENP: An ASGrammar-based GENerative Policy Framework (2018) (13)
- A Research Agenda for the Study of Entropic Social Structural Evolution, Functional Roles, Adhocratic Leadership Styles, and Credibility in Online Organizations and Knowledge Markets (2015) (13)
- Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks (2020) (13)
- Context-Dependent Authentication and Access Control (2009) (13)
- k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments (2010) (13)
- Spatial Domains for the Administration of Location-based Access Control Policies (2008) (13)
- A temporal object-oriented data model with multiple granularities (1999) (13)
- Secure interoperation in a multi-domain environment (2004) (13)
- ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems (2000) (13)
- Receipt management- transaction history based trust establishment (2007) (13)
- PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. (2019) (13)
- Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation (2015) (13)
- An object-oriented data model for distributed office applications (1990) (13)
- Query Processing Techniques for Compliance with Data Confidence Policies (2009) (13)
- UCS-Router: a policy engine for enforcing message routing rules in a universal communication system (2002) (13)
- In the shadows we trust: A secure aggregation tolerant watermark for data streams (2015) (12)
- Emerging trends around big data analytics and security: panel (2012) (12)
- A discretionary access control model with temporal authorizations (1994) (12)
- Using spatial data access structures for filtering nearest neighbor queries (2002) (12)
- Restricted Authentication and Encryption for Cyber-physical Systems (2009) (12)
- Roles, Trust, and Reputation in Social Media Knowledge Markets: Theory and Methods (2014) (12)
- Effective and efficient implementation of an information flow control protocol for service composition (2009) (12)
- Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols (1994) (12)
- Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries (2008) (12)
- SimP: Secure interoperable multi-granular provenance framework (2016) (12)
- Controlling data disclosure in computational PIR protocols (2010) (12)
- Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (2006) (12)
- Verification of Receipts from M-commerce Transactions on NFC Cellular Phones (2008) (12)
- Security and Privacy in the IoT (2017) (12)
- Assuring Security Properties in Third-party Architectures (2005) (12)
- A Policy-Based Accountability Tool for Grid Computing Systems (2008) (12)
- Protecting information on the Web (2000) (12)
- An access control mechanism for large scale data dissemination systems (2001) (12)
- Detecting, Representing and Querying Collusion in Online Rating Systems (2012) (12)
- An Update Protocol for XML Documents in Distributed and Cooperative Systems (2005) (12)
- Authenticated Top-K Aggregation in Distributed and Outsourced Databases (2012) (12)
- CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents (1999) (11)
- Privacy Preserving Location Recommendations (2017) (11)
- PEAR: a hardware based protocol authentication system (2010) (11)
- Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks (2016) (11)
- An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data (2005) (11)
- A Game of Things: Strategic Allocation of Security Resources for IoT (2017) (11)
- An approach to support method invocations in object-oriented queries (1992) (11)
- A New Class of Buffer Overflow Attacks (2011) (11)
- Privacy Requirements in Identity Management Solutions (2007) (11)
- A non-timestamped authorization model for data management systems (1996) (11)
- XJoin index: indexing XML data for efficient handling of branching path expressions (2004) (11)
- A New Approach to Weighted Multi-Secret Sharing (2011) (11)
- Policy Monitoring with User-Preferences in PDL∗ (2003) (11)
- Resilient Authenticated Execution of Critical Applications in Untrusted Environments (2012) (11)
- Secure Collaboration in a Mediator-Free Distributed Environment (2008) (11)
- Zero Trust Architecture: Does It Help? (2021) (11)
- A framework for verification and optimal reconfiguration of event-driven role based access control policies (2012) (11)
- AI for Security and Security for AI (2021) (10)
- Visualization for Access Control Policy Analysis Results Using Multi-level Grids (2009) (10)
- Efficient privacy preserving reputation protocols inspired by secure sum (2010) (10)
- Replacing Lost or Stolen E-Passports (2007) (10)
- Protecting Databases from Query Flood Attacks (2008) (10)
- Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking (2015) (10)
- Result-Based Detection of Insider Threats to Relational Databases (2019) (10)
- Query Mesh: Multi-Route Query Processing Technology (2009) (10)
- On XACML's Adequacy to Specify and to Enforce HIPAA (2012) (10)
- Some Usability Considerations in Access Control Systems (2008) (10)
- CHAPTER 3 – Security for Distributed Systems: Foundations of Access Control (2008) (10)
- A privacy preserving assertion based policy language for federation systems (2007) (10)
- Marlin: making it harder to fish for gadgets (2012) (10)
- Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information (2006) (10)
- Privacy-preserving similarity measurement for access control policies (2010) (10)
- XACML Policy Evaluation with Dynamic Context Handling (2015) (10)
- An Analytic Approach to People Evaluation in Crowdsourcing Systems (2012) (10)
- Integrated document and knowledge management for the knowledge-based enterprise (2000) (10)
- Effectiveness of Model-Based Defenses for Digitally Controlled Industrial Systems: Nuclear Reactor Case Study (2020) (10)
- Privacy Preserving Biometrics-Based and User Centric Authentication Protocol (2014) (10)
- Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations (2021) (10)
- Provenance-Based Analytics Services for Access Control Policies (2017) (10)
- Provenance-aware security risk analysis for hosts and network flows (2014) (10)
- Query optimization by using knowledge about data semantics (1992) (10)
- Decentralized authorization and data security in web content delivery (2007) (10)
- Private Information Retrieval (2013) (10)
- Querying Multigranular Spatio-temporal Objects (2008) (10)
- CiVeDi: a customized virtual environment for database interaction (2004) (10)
- Digital Identity Protection-Concepts and Issues (2009) (10)
- A Collaborative Reputation System Based on Credibility Propagation in WSNs (2015) (10)
- Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application (2004) (10)
- Transparency in Social Media (2015) (10)
- Purpose based access control for privacy protection (2004) (10)
- Introduction to Data Science and Engineering (2016) (10)
- The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift (2010) (9)
- Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries (2000) (9)
- Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow (2018) (9)
- Towards a theory for privacy preserving distributed OLAP (2012) (9)
- Achieving stricter correctness requirements in multilevel secure databases (1993) (9)
- Managing Risks in RBAC Employed Distributed Environments (2007) (9)
- Purpose Based Access Control for Privacy Protection in Database Systems (2005) (9)
- ProFact: A Provenance-Based Analytics Framework for Access Control Policies (2019) (9)
- Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations (2018) (9)
- Content-based filtering of Web documents: the MaX system and the EUFORBIA project (2003) (9)
- Mask: a system for privacy-preserving policy-based access to published content (2010) (9)
- Modeling User Intrinsic Characteristic on Social Media for Identity Linkage (2018) (9)
- Static analysis of intensional databases in U-Datalog (extended abstract) (1996) (9)
- Secure mutual proximity zone enclosure evaluation (2014) (9)
- A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles (2020) (9)
- Artificial Intelligence and Security (2019) (9)
- Privacy-preserving Real-time Anomaly Detection Using Edge Computing (2020) (9)
- Transaction optimization in rule databases (1994) (9)
- Distributed Intelligence: Trends in the Management of Complex Systems (2017) (9)
- EXAM: An Environment for Access Control Policy Analysis and Management (2008) (9)
- Security with Privacy-Opportunities and Challenges (2016) (9)
- Navigational Accesses in a Temporal Object Model (1998) (9)
- Trigger Inheritance and Overriding in Active Object Database Systems (1997) (9)
- Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes (2009) (9)
- A Generative Policy Model for Connected and Autonomous Vehicles (2019) (9)
- Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery (2018) (9)
- Editorial: Introduction to Data Security and Privacy (2016) (9)
- Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones (2019) (9)
- A distributed approach to enabling privacy-preserving model-based classifier training (2009) (9)
- Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks (2016) (9)
- The next generation of access control models: Do we need them and what should they be? (2001) (9)
- Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper) (2016) (9)
- An approach to cooperative updates of XML documents in distributed systems (2005) (9)
- The Indispensability of Dispensable Indexes (1999) (9)
- Securing Mobile Applications (2016) (8)
- Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities—Framework and Challenges (2018) (8)
- PDL with Maximum Consistency Monitors (2003) (8)
- Interactive Location Cloaking with the PROBE Obfuscator (2009) (8)
- Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy (2017) (8)
- Viewpoints in object database systems (1996) (8)
- A database approach to quality of service specification in video databases (2003) (8)
- Quality of service in multimedia digital libraries (2001) (8)
- A Bottom-Up Interpreter for a Database Language with Updates and Transactions (1994) (8)
- A trust assessment framework for streaming data in WSNs using iterative filtering (2015) (8)
- An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices (2009) (8)
- PUF ROKs: a hardware approach to read-once keys (2011) (8)
- A system for securing push-based distribution of XML documents (2007) (8)
- A knowledge graph empowered online learning framework for access control decision-making (2022) (8)
- A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration (2019) (8)
- Role Mining for Engineering and Optimizing Role Based Access Control Systems (2007) (8)
- A Multi-Strategy Approach to Rating and Filtering Online Resources (2005) (8)
- Design issues in interactive user interfaces (1985) (8)
- Navigating through multiple temporal granularity objects (2001) (8)
- A Secure Publishing Service for Digital Libraries of XML Documents (2001) (8)
- Extending social networks with delegation (2017) (8)
- A Formal Representation for State Diagrams in the OMT Methodology (1996) (8)
- POSTER: Data quality evaluation: integrating security and accuracy (2013) (8)
- Digital identity enrolment and assurance support for VeryIDX (2010) (8)
- PANDDE: Provenance-based ANomaly Detection of Data Exfiltration (2016) (8)
- CONCERTO, conceptual indexing, querying and retrieval of digital documents (1999) (8)
- Rule termination analysis investigating the interaction between transactions and triggers (2002) (8)
- Building Sensor-Based Big Data Cyberinfrastructures (2015) (8)
- Anonymity Preserving Techniques in Trust Negotiations (2005) (8)
- Framework for behavioral analytics in anomaly identification (2017) (7)
- Trusted Identities in Cyberspace (2012) (7)
- Proceedings of the 20th international conference companion on World wide web (2011) (7)
- Privacy-preserving assessment of social network data trustworthiness (2012) (7)
- On the Number of Descendants in an Object DAG (1996) (7)
- An advanced information management system (1993) (7)
- A semantic approach to build personalized interfaces in the cultural heritage domain (2006) (7)
- Proactive defense of insider threats through authorization management (2011) (7)
- Edge-Based Intrusion Detection for IoT devices (2020) (7)
- Enhancing the expressive power of the U-Datalog language (2001) (7)
- Next generation firewalls for dynamic coalitions (2017) (7)
- Finding Flaws from Password Authentication Code in Android Apps (2019) (7)
- Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy (2020) (7)
- Query Processing with K-Anonymity (2012) (7)
- Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models (1998) (7)
- Signature and Access Control Policies for XML Documents (2003) (7)
- An Application Restriction System for Bring-Your-Own-Device Scenarios (2016) (7)
- Author-Chi - A System for Secure Dissemination and Update of XML Documents (2003) (7)
- Semantics-aware Obfuscation for Location Privacy (2008) (7)
- Privacy-preserving techniques for location-based services (2009) (7)
- Hybrid Private Record Linkage (2019) (7)
- Blended Learning. Education in a Smart Learning Environment: 13th International Conference, ICBL 2020, Bangkok, Thailand, August 24–27, 2020, Proceedings (2020) (7)
- On Hashing Graphs (2012) (7)
- Adaptive Management of Multigranular Spatio-Temporal Object Attributes (2009) (7)
- Adaptive data management for self-protecting objects in cloud computing systems (2012) (7)
- Standards for Web Services Security (2009) (7)
- A Logical Approach to Cooperative Information Systems (2000) (7)
- Evolution specification of multigranular temporal objects (2002) (7)
- On Using Materialization Strategies for a Temporal Authorization Model (1996) (7)
- Leakage-Free Integrity Assurance for Tree Data Structures (2009) (7)
- A Flexible Access Control Model for Web Services (2004) (7)
- The State of the Journal Editorial (2015) (7)
- User Preferences VS Minimality in PPDL (2003) (7)
- Privacy preserving identity attribute verification in windows cardspace (2010) (7)
- Strategic Security Resource Allocation for Internet of Things (2016) (7)
- Social Computing and Social Media. Participation, User Experience, Consumer Experience, and Applications of Social Computing: 12th International Conference, SCSM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (7)
- PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems (2018) (7)
- Efficient integration of fine-grained access control and resource brokering in grid (2009) (7)
- Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries: 5th International Workshop, BrainLes 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 17, 2019, Revised Selected Papers, Part II (2020) (7)
- Structural Similarity Measures in Sources of XML Documents (2006) (7)
- An Architecture for Contextual Insider Threat Detection (2009) (7)
- A Formal Definition of the Chimera Object-Oriented Data Model (1998) (7)
- Multimodal Learning for Clinical Decision Support and Clinical Image-Based Procedures: 10th International Workshop, ML-CDS 2020, and 9th International Workshop, CLIP 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 4–8, 2020, Proceedings (2020) (7)
- Flexible Commit Protocols for Advanced Transaction Processing (1997) (7)
- Refined rules termination analysis through transactions (2003) (7)
- Overview of Mobile Containerization Approaches and Open Research Directions (2017) (7)
- Integration of virtual reality and database systems for cultural heritage dissemination (2006) (7)
- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation (2019) (7)
- Argumentation-based policy analysis for drone systems (2017) (7)
- Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems (2011) (7)
- Modelling Database Updates with Constraint Logic Programming (1992) (6)
- RFID Security and Privacy (2013) (6)
- Community-based self generation of policies and processes for assets: Concepts and research directions (2017) (6)
- OBJECT EVOLUTION IN OBJECT DATABASES (1999) (6)
- VeryIDX - A Digital Identity Management System for Pervasive Computing Environments (2008) (6)
- An abstraction-based approach to measuring the structural similarity between two unordered XML documents (2003) (6)
- Role-based access control to outsourced data in cloud computing (2013) (6)
- Secure Delta-Publishing of XML Content (2008) (6)
- Indexing Techniques for Ad-vanced Database Applications (1997) (6)
- Aggregated Privacy-Preserving Identity Verification for Composite Web Services (2011) (6)
- Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment (2004) (6)
- Cloud Computing and Security (2016) (6)
- Analyzing semantic locations cloaking techniques in a probabilistic grid-based map (2010) (6)
- Black-box Model Inversion Attribute Inference Attacks on Classification Models (2020) (6)
- Security with Privacy -- Opportunities and Challenges: Panel Position Paper (2014) (6)
- Composite Objects Revisted (1989) (6)
- Privacy-preserving management of transactions' receipts for mobile environments (2009) (6)
- Privilege States Based Access Control for Fine-Grained Intrusion Response (2010) (6)
- Access to Multigranular Temporal Objects (2004) (6)
- An apples-to-apples comparison of two database journals (2005) (6)
- IoT Security A Comprehensive Life Cycle Framework (2019) (6)
- Transparency in Social Media: Tools, Methods and Algorithms for Mediating Online Interactions (2015) (6)
- Robust Sensor Localization against Known Sensor Position Attacks (2019) (6)
- Shortfall-Based Optimal Security Provisioning for Internet of Things (2017) (6)
- Efficient and privacy-preserving enforcement of attribute-based access control (2010) (6)
- A context-aware system to secure enterprise content: Incorporating reliability specifiers (2018) (6)
- Artificial Intelligence at the Edge (2020) (6)
- A decentralized temporal autoritzation model (1996) (6)
- A Formal Language for Specifying Policy Combining Algorithms in Access Control (2008) (6)
- A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems (2018) (6)
- Cross-Cultural Design. User Experience of Products, Services, and Intelligent Environments: 12th International Conference, CCD 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (6)
- An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs (2020) (6)
- Proceedings of the third ACM conference on Data and application security and privacy (2013) (6)
- Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases (1995) (6)
- Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials (2018) (6)
- Database technology on the web (2002) (6)
- Assured Information Sharing Life Cycle (2009) (6)
- Integrity Constraint Checking in Chimera (1997) (6)
- Guest Editorial: Introduction to the Special Section (2000) (6)
- Decentralized Administration for a Temporal Access Control Model (1997) (6)
- VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices (2009) (6)
- Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework (2013) (6)
- Flexible Transaction Dependencies in Database Systems (2000) (6)
- Secure third party distribution of XML data (2005) (6)
- Finitely Representable Nested Relations (1999) (5)
- Applications of object-oriented technology to the integration of heterogeneous database systems (1994) (5)
- Quality of Service Specification in Video Databases (2003) (5)
- Access Control Strategies for Virtualized Environments in Grid Computing Systems (2007) (5)
- Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (2010) (5)
- Mission Support for Drones: a Policy Based Approach (2017) (5)
- Exploring The Interaction Effects for Temporal Spatial Behavior Prediction (2019) (5)
- An evaluation of text access methods (1989) (5)
- Secure cryptographic key management system (CKMS) considerations for smart grid devices (2011) (5)
- Security Threats: Protecting the New Cyberfrontier (2016) (5)
- Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings (2020) (5)
- Cryptographic Key Management for Smart Power Grids - Approaches and Issues (2012) (5)
- Denial-of-Service Attacks to UMTS (2015) (5)
- Reactive Access Control Systems (2018) (5)
- Hippocratic Data Streams-Concepts, Architectures and Issues (2005) (5)
- Physically restricted authentication with trusted hardware (2009) (5)
- Myocardial Pathology Segmentation Combining Multi-Sequence Cardiac Magnetic Resonance Images: First Challenge, MyoPS 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 4, 2020, Proceedings (2020) (5)
- Security and privacy of electronic health information systems (2015) (5)
- Universal Access in Human-Computer Interaction. Applications and Practice: 14th International Conference, UAHCI 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (5)
- MULTOS: a Document Server for Distributed Office Systems (1988) (5)
- Reasoning about RDF statements with default rules (2005) (5)
- Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model (1998) (5)
- Multimedia Data Handling in a Knowledge Representation System (1992) (5)
- A Context-Aware System to Secure Enterprise Content (2016) (5)
- Jarvis: Moving Towards a Smarter Internet of Things (2020) (5)
- Policy languages for digital identity management in federation systems (2006) (5)
- Extending the ODMG object model with triggers (2004) (5)
- A Comprehensive Approach for Solving Policy Heterogeneity (2009) (5)
- The Update Problem in the Distributed Database System Hermes/1 (1983) (5)
- A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP (2014) (5)
- CRIS — Computational research infrastructure for science (2013) (5)
- Identity, Privacy, and Deception in Social Networks (2014) (5)
- Learning and Collaboration Technologies. Designing, Developing and Deploying Learning Experiences: 7th International Conference, LCT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (5)
- PUF ROKs: generating read-once keys from physically unclonable functions (2010) (5)
- Essentials of Blockchain Technology (2019) (5)
- Access Control Systems for Geospatial Data and Applications (2007) (5)
- Human Aspects of IT for the Aged Population. Technologies, Design and User Experience: 6th International Conference, ITAP 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (5)
- From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability (2019) (5)
- Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search (2021) (5)
- A decentralized temporal authorization model (1996) (5)
- ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations (2021) (5)
- Profile-Based Selection of Accountability Policies in Grid Computing Systems (2011) (5)
- Grid based methods for estimating spatial join selectivity (2004) (5)
- Do Sticky Elites Produce Online Knowledge of Higher Quality? (2017) (5)
- CLP(AD) as a Deductive Database Language with Updates (1992) (5)
- Modelling Lava Flow to Assess Hazard on Mount Etna (Italy). From Geological Data to a Preliminary Hazard Map (2006) (5)
- An overview of the Comandos Integration System (1995) (4)
- P-CDN: Extending access control capabilities of P2P systems to provide CDN services (2008) (4)
- Trust-Chi: An XML Framework for Trust Negotiations (2003) (4)
- Adaptive Trust Update Frequency in MANETs (2015) (4)
- Research issues in authorization models for hypertext systems (1995) (4)
- Modeling User Intrinsic Characteristic on Social Media for Identity Linkage (2018) (4)
- Techniques and Systems for Anomaly Detection in Database Systems (2018) (4)
- Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers (2020) (4)
- An XML-Based Approach to Document Flow Verification (2004) (4)
- Fine-grained analysis of packet loss symptoms in wireless sensor networks (2013) (4)
- Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways (2019) (4)
- Modeling the Risk & Utility of Information Sharing in Social Networks (2012) (4)
- ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage (2003) (4)
- A conceptual annotation approach to indexing in a Web-based information system (1999) (4)
- A Comprehensive XML Based Approach to Trust Negotiations (2005) (4)
- A selective encryption approach to fine-grained access control for P2P file sharing (2010) (4)
- Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services (2020) (4)
- Querying Private Data in Moving-Object Environments (2005) (4)
- Artificial Intelligence in Music, Sound, Art and Design: 9th International Conference, EvoMUSART 2020, Held as Part of EvoStar 2020, Seville, Spain, April 15–17, 2020, Proceedings (2020) (4)
- Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases (2018) (4)
- Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases (1983) (4)
- Private data warehouse queries (2013) (4)
- Approaches to Handling Temporal Data in Object-Oriented Databases (1997) (4)
- X-rbac : an Access Control Language for Multi-domain Environments X-rbac an Access Cont R Ol Language for Mult I-dom Ain Envir Onm Ent S (2004) (4)
- Object-Oriented Methodologies and Systems (1994) (4)
- Protecting information systems from insider threats - concepts and issues (2011) (4)
- Security with privacy - A research agenda (2014) (4)
- Computing Research Challenges in Next Generation Wireless Networking (2021) (4)
- Fine with “1234”? An Analysis of SMS One-Time Password Randomness in Android Apps (2021) (4)
- Towards location-based access control in healthcare emergency response (2009) (4)
- XACML Function Annotations (2007) (4)
- A Semantic Based Redesigning of Distributed Workflows (1998) (4)
- A Flexible Authentication Method for UDDI Registries (2003) (4)
- Network Policy Enforcement Using Transactions: The NEUTRON Approach (2018) (4)
- Enforcing Mandatory Access Control in Object Bases (1993) (4)
- Federated Learning for Coalition Operations (2019) (4)
- Dynamic and adaptive policy models for coalition operations (2017) (4)
- Secure and resilient proximity-based access control (2013) (4)
- Scalable Non-observational Predicate Learning in ASP (2021) (4)
- Building robust temporal user profiles for anomaly detection in file system accesses (2016) (4)
- Broadcast Group Key Management with Access Control Vectors (2010) (4)
- Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System (1981) (4)
- Detection of Temporal Data Ex-Filtration Threats to Relational Databases (2018) (4)
- Defending against insider threats and internal data leakage (2012) (4)
- Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Posture, Motion and Health: 11th International Conference, DHM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (4)
- Privacy Preserving OLAP over Distributed XML Documents (2009) (4)
- The Indiana Center for Database Systems at Purdue University (2005) (4)
- How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management) (2018) (4)
- Learning Domain Semantics and Cross-Domain Correlations for Paper Recommendation (2021) (4)
- Privacy Preserving Context Aware Publish Subscribe Systems 2013-1 (2013) (4)
- Query decomposition in an object-oriented database system distributed on a local area network (1995) (4)
- Randomized and Efficient Authentication in Mobile Environments (2014) (4)
- Seamless and Secure Bluetooth LE Connection Migration (2017) (4)
- Matching an XML Document against a Set of DTDs (2002) (4)
- Demo Overview: Privacy-Enhancing Features of IdentiDroid (2014) (4)
- An Access Control Framework for WS-BPEL Processes (2012) (4)
- Data dissemination on the web (2004) (4)
- Policies, Access Control, and Formal Methods (2012) (4)
- Privacy preserving data mining (2006) (4)
- Privacy-Preserving Multi-Party Analytics over Arbitrarily Partitioned Data (2017) (4)
- PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols (2020) (4)
- CoCoMA: Content and Context Aware Multimedia Content Retrieval, Delivery and Presentation (2005) (4)
- Web Service Technologies, Principles, Architectures, and Standards (2009) (4)
- Spatial Knowledge-Based Applications and Technologies: Research Issues (2005) (4)
- Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT (2019) (4)
- Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses (2015) (3)
- On the Quality of Classification Models for Inferring ABAC Policies from Access Logs (2019) (3)
- A Similarity Measure for Comparing Access Control Policies (2009) (3)
- Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2 (2009) (3)
- Fuzzy and presentation algebras for web and multimedia data (2000) (3)
- It Takes a Village to Secure Cellular Networks (2019) (3)
- A Federated Digital Identity Management Approach for Business Processes (2008) (3)
- Policy based ensembles for multi domain operations (2020) (3)
- TOWARDS IMPROVED FEDERATED IDENTITY AND PRIVILEGE MANAGEMENT IN OPEN SYSTEMS (2004) (3)
- k-anonymous attribute-based access control (2007) (3)
- Indexing constraint databases by using a dual representation (1999) (3)
- Security with Privacy (2019) (3)
- XML security (2004) (3)
- Correctness of semantic integrity checking in database management systems (1988) (3)
- Policy Mapper : A Simplified Approach for Administration of Location-based Access Control Policies (2007) (3)
- Integrating data management and panoramic images for an effective representation of cultural heritage information (2007) (3)
- Toward privacy-preserving database management systems --- access control and data anonymization (2007) (3)
- Network Temperature: A Novel Statistical Index for Networks Measurement and Management (2022) (3)
- Spatio-temporal multi-granularity : modelling and implementation challenges (2009) (3)
- Cybersecurity for product lifecycle management a research roadmap (2015) (3)
- Design, User Experience, and Usability. Case Studies in Public and Personal Interactive Systems: 9th International Conference, DUXU 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part III (2020) (3)
- Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases (2014) (3)
- Privately Updating Suppression and Generalization based k-Anonymous Databases (2008) (3)
- Computer Science – Theory and Applications: 15th International Computer Science Symposium in Russia, CSR 2020, Yekaterinburg, Russia, June 29 – July 3, 2020, Proceedings (2020) (3)
- Generative Policies for Coalition Systems - A Symbolic Learning Framework (2019) (3)
- Biometrics and identity management in healthcare applications (2009) (3)
- Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases (1995) (3)
- The Quest for Data Transparency (2020) (3)
- Towards an architecture for policy-based management of software defined coalitions (2017) (3)
- Ordering and Path Constraints over Semistructured Data (2003) (3)
- Document query processing strategies: cost evaluation and heuristics (1988) (3)
- Dynamic Privacy Policy Management in Services-Based Interactions (2014) (3)
- A Policy System for Control of Data Fusion Processes and Derived Data (2018) (3)
- An efficient certificateless cryptography scheme without pairing (2013) (3)
- Cloud Computing and Security (2018) (3)
- An approach to authorization modelling in object-oriented database systems (1991) (3)
- Grid Based Methods for the Spatial Join Estimation (2003) (3)
- Query Processing Based on Complex Object Types. (1986) (3)
- A Policy Framework for Access Management in Federated Information Sharing (2004) (3)
- QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework (2016) (3)
- Private Cell Retrieval From Data Warehouses (2016) (3)
- Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing (2021) (3)
- Cryptographic Key Management for Smart Power Grids (2012) (3)
- Policy-Based Autonomic Data Governance (2019) (3)
- Graph Transformation: 13th International Conference, ICGT 2020, Held as Part of STAF 2020, Bergen, Norway, June 25–26, 2020, Proceedings (2020) (3)
- Multimedia Database Support for Digital Libraries (2008) (3)
- An Integrated Approach to Rating and Filtering Web Content (2005) (3)
- POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs (2014) (3)
- Hierarchical data placement for navigational multimedia applications (2003) (3)
- Proactive Role Discovery in Mediator-Free Environments (2008) (3)
- Securing Named Data Networks: Challenges and the Way Forward (2018) (3)
- Data in the cloud: authentication without leaking (2010) (3)
- Universal Access in Human-Computer Interaction. Design Approaches and Supporting Technologies: 14th International Conference, UAHCI 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (3)
- Workflow Architecture for Interactive Video Management Systems (2004) (3)
- Variable Neighborhood Search: 7th International Conference, ICVNS 2019, Rabat, Morocco, October 3–5, 2019, Revised Selected Papers (2020) (3)
- Static Analysis of Transactional Intensional Databases (1994) (3)
- IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web (2002) (3)
- ID 2 S Password-Authenticated Key Exchange Protocols (2016) (3)
- Exception Handling in Object-Oriented Databases (2000) (3)
- Proceedings of the 8th International Conference on Extending Database Technology: Advances in Database Technology (1994) (3)
- Security for grid-based computing systems issues and challenges (2004) (2)
- Generic Methods in Deductive Object Databases (1994) (2)
- Fully Homomorphic Encryption (2014) (2)
- Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems (1994) (2)
- Structural Signatures: How to Authenticate Graphs Without Leaking (2010) (2)
- Protecting XML documents (2000) (2)
- Proceedings of the 14th European Conference on Object-Oriented Programming (2000) (2)
- Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks (2013) (2)
- A Comprehensive Query Language for Provenance Information (2018) (2)
- Privacy-Preserving Updates to Confidential and Anonymous Databases (2007) (2)
- IoT Attacks and Malware (2021) (2)
- Credibility-enhanced curated database: Improving the value of curated databases (2010) (2)
- Editorial of special issue on security and privacy in cloud computing (2016) (2)
- Secure Data Dissemination (2004) (2)
- Advanced Information Systems Engineering: 32nd International Conference, CAiSE 2020, Grenoble, France, June 8–12, 2020, Proceedings (2020) (2)
- A Logical Approach to Quality of Service Specification in Video Databases (2004) (2)
- A Data Access Structure for Filtering Distance Queries in Image Retrieval (1996) (2)
- Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III (2020) (2)
- Trust- X : An XML Framework for Trust Negotiations (2003) (2)
- A structure preserving approach for securing XML documents (2007) (2)
- PC Co-chairs' Message (2003) (2)
- A secure architecture design based on application isolation, code minimization and randomization (2013) (2)
- Artificial Intelligence & Cooperation (2020) (2)
- An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems (1987) (2)
- Self-Generating Policies for Machine Learning in Coalition Environments (2018) (2)
- Attribute refinement in a multigranular temporal object data model (2009) (2)
- Database Security (2007) (2)
- Queries, constraints, updates and transactions within a logic-based language (1993) (2)
- Advances in Information Retrieval: 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part II (2020) (2)
- On comparing the expressing power of access control model frameworks (2004) (2)
- Introducing External Functions in Constraint Query Languages (1998) (2)
- Secure sensor network SUM aggregation with detection of malicious nodes (2012) (2)
- A GENERAL FRAMEWORK FOR WEB CONTENT FILTERING by Elisa Bertino (2)
- 5G Security and Privacy: A Research Roadmap (2020) (2)
- Virtual, Augmented and Mixed Reality. Design and Interaction: 12th International Conference, VAMR 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (2)
- Authentication Techniques for UDDI Registries (2007) (2)
- Specifying and computing hierarchies of temporal authorizations (1999) (2)
- A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations (2019) (2)
- WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation (2014) (2)
- RahasNym: Pseudonymous Identity Management System for Protecting against Linkability (2016) (2)
- FLAP - A Federated Learning Framework for Attribute-based Access Control Policies (2020) (2)
- An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration (2002) (2)
- Tagging Stream Data for Rich RealTime (2009) (2)
- Inside Attack Filtering for Robust Sensor Localization (2015) (2)
- Smart Multimedia: Second International Conference, ICSM 2019, San Diego, CA, USA, December 16–18, 2019, Revised Selected Papers (2020) (2)
- Human Aspects of IT for the Aged Population. Technology and Society: 6th International Conference, ITAP 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part III (2020) (2)
- Parallel Computing Technologies: 15th International Conference, PaCT 2019, Almaty, Kazakhstan, August 19–23, 2019, Proceedings (2019) (2)
- Information carrying identity proof trees (2007) (2)
- Privacy in the Era of 5G, IoT, Big Data and Machine Learning (2020) (2)
- Robust Aggregation of Inconsistent Information: Concepts and Research Directions (2015) (2)
- AI-driven data security and privacy (2020) (2)
- Generative Policy Framework for AI Training Data Curation (2019) (2)
- Cryptanalysis of the LCSS RFID Authentication Protocol (2008) (2)
- Editorial: Special Issue on Data Transparency—Data Quality, Annotation, and Provenance (2022) (2)
- Distributed Cooperative Updates of XML Documents (2002) (2)
- An index allocation tool for object-oriented database systems (2000) (2)
- A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles (2021) (2)
- Advances in database technology - EDBT 2004 : 9th International Conference on Extending Database Technology : Heraklion, Crete, Greece, March 14-18, 2004 : proceedings (2004) (2)
- A policy-based approach for assuring data integrity in DBMSs (2010) (2)
- Cross-Cultural Design. Applications in Health, Learning, Communication, and Creativity: 12th International Conference, CCD 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (2)
- Static Analysis of Logical Languages with Deferred Update Semantics (2003) (2)
- A Semi-automatic System for Conceptual Annotation, its Application to Resource Construction and Evaluation (2000) (2)
- VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol (2022) (2)
- Optimal Placement of Security Resources for the Internet of Things (2018) (2)
- Integration of Virtual Reality and Database System Techniques (2005) (2)
- DiXeminator: A Profile-Based Selective Dissemination System for XML Documents (2004) (2)
- Security Issues for Distributed Fusion in Coalition Environments (2018) (2)
- Information Security (2004) (2)
- Attacks on Artificial Intelligence [Last Word] (2021) (2)
- Review - Role Hierarchies and Constraints for Lattice-Based Access Controls (2000) (2)
- An Extended Authorization Model for Object Databases (1995) (2)
- The integration of heterogeneous data management systems (1995) (2)
- Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet (2019) (2)
- Trust Negotiations with Customizable Anonymity (2006) (2)
- Ad-Hoc, Mobile, and Wireless Networks: 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings (2019) (2)
- Analysis of Encryption Key Generation in Modern Crypto Ransomware (2022) (2)
- An Approach to Integrate Multimedi Data in a Knowledge Representation System (1992) (2)
- Flow policies: specification and enforcement (2004) (2)
- Vulnerabilities leading to denial of services attacks in grid computing systems: a survey (2010) (2)
- Services for Zero Trust Architectures - A Research Roadmap (2021) (2)
- Managing training data from untrusted partners using self-generating policies (2019) (2)
- Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper (2017) (2)
- Security services for healthcare applications (2008) (2)
- Protocols and systems for privacy preserving protection of digital identity (2007) (2)
- Intelligent Tutoring Systems: 16th International Conference, ITS 2020, Athens, Greece, June 8–12, 2020, Proceedings (2020) (2)
- Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey (2017) (2)
- Elite size and resilience impact on global system structuration in social media (2014) (2)
- Towards structure discovering in video data (2005) (2)
- Structural Information and Communication Complexity: 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29–July 1, 2020, Proceedings (2020) (2)
- Advances in Database Technology - EDBT 2002 : 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, 2002 : proceedings (2002) (2)
- Research challenges in dynamic policy-based autonomous security (2017) (2)
- A Policy-Based Authorization System for Web Services : Integrating X-GTRBAC and WS-Policy (2005) (2)
- ACM/Springer Mobile Networks and Applications (MONET) Special Issue on “Collaborative Computing: Networking, Applications and Worksharing” (2012) (1)
- Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings (2020) (1)
- Data in the Cloud : Authentication of Trees , Graphs , and Forests Without Leaking (2010) (1)
- ATFuzzer (2020) (1)
- Development of Multilevel Secure Database Systems (2002) (1)
- Evolutionary Computation in Combinatorial Optimization: 20th European Conference, EvoCOP 2020, Held as Part of EvoStar 2020, Seville, Spain, April 15–17, 2020, Proceedings (2020) (1)
- An adaptive concurrency control protocol for mobile transactions (1999) (1)
- Index Configurations in Object-Oriented Databases (1994) (1)
- Real-time Digital Signatures for Named Data Networking (2020) (1)
- Crypto-Chain: A Relay Resilience Framework for Smart Vehicles (2021) (1)
- Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2009, November 3, 2009, Seattle, WA, USA (2009) (1)
- Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part III (2020) (1)
- Proceedings of the International Symposium on Object-Oriented Methodologies and Systems (1994) (1)
- A Security-Constrained Reinforcement Learning Framework for Software Defined Networks (2021) (1)
- HCI in Mobility, Transport, and Automotive Systems. Driving Behavior, Urban and Smart Mobility: Second International Conference, MobiTAS 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (1)
- Triggers in Java-based Databases (2000) (1)
- Nearest Neighbor Queries with Location Privacy (2014) (1)
- Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis (2022) (1)
- Panel: The next generation of acess control models (panel session): do we need them and what should they be? (2001) (1)
- SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems (2021) (1)
- Tutorial 6: Security in SOA and Web Services (2006) (1)
- RahasNym: Protecting against Linkability in the Digital Identity Ecosystem (2015) (1)
- Document Analysis Systems: 14th IAPR International Workshop, DAS 2020, Wuhan, China, July 26–29, 2020, Proceedings (2020) (1)
- Editorial: Dependable and Secure Computing, IEEE Transactions on (2014) (1)
- Cloud Computing and Security (2017) (1)
- Credibility Propagation for Robust Data Aggregation in WSNs (2014) (1)
- SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities (2022) (1)
- On Security Policy Migrations (2020) (1)
- Data quality evaluation: integrating security and accuracy. (2013) (1)
- PC chairs' welcome (2016) (1)
- X-GTRBAC: an XML-based framework for distributed access control (2004) (1)
- I Data ' Knowledge Engineering Data Security (1)
- The generative policy approach for dynamic collaboration in coalition environments (2018) (1)
- Object-Oriented Databases and Applications - Selected Papers from ICDE'98 (1999) (1)
- Human-Computer Interaction. Design and User Experience: Thematic Area, HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (1)
- Rigorous State-Based Methods: 7th International Conference, ABZ 2020, Ulm, Germany, May 27–29, 2020, Proceedings (2020) (1)
- A View Mechanism for a Knowledge-Based Information System (1994) (1)
- D ec 2 01 4 Privacy-Preserving and Outsourced Multi-User k-Means Clustering (2015) (1)
- Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation (2018) (1)
- MIST 2016: 8th International Workshop on Managing Insider Security Threats (2016) (1)
- Agent-based accountable grid computing systems (2013) (1)
- Advances in Swarm Intelligence: 11th International Conference, ICSI 2020, Belgrade, Serbia, July 14–20, 2020, Proceedings (2020) (1)
- NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures (2022) (1)
- Towards a learning-algorithm agnostic generative policy model for coalitions (2019) (1)
- Coordination Models and Languages: 22nd IFIP WG 6.1 International Conference, COORDINATION 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15–19, 2020, Proceedings (2020) (1)
- Cryptographic Key Management for Smart Power Grids 2012-1 (2012) (1)
- Practical Anonymous Subscription with Revocation Based on Broadcast Encryption (2020) (1)
- Assured information sharing: concepts and issues (2009) (1)
- Vison Paper: Micro-views, or on How to Protect Privacy while Enhancing Data Usability (2005) (1)
- Editorial: Security and privacy protection vs sustainable development (2018) (1)
- Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II (2020) (1)
- Transactions on Edutainment XVI (2020) (1)
- Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference on (2007) (1)
- Private Searching on Streaming Data (2014) (1)
- Efficient General Policy Decision by Using Mutable Variable Aware Cache (2013) (1)
- Human Interface and the Management of Information. Interacting with Information: Thematic Area, HIMI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (1)
- The Semantic Web: 17th International Conference, ESWC 2020, Heraklion, Crete, Greece, May 31–June 4, 2020, Proceedings (2020) (1)
- Image and Signal Processing: 9th International Conference, ICISP 2020, Marrakesh, Morocco, June 4–6, 2020, Proceedings (2020) (1)
- An assessment of accountability policies for large-scale distributed computing systems (2009) (1)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part VII (2020) (1)
- Advances in Information Retrieval: 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part I (2020) (1)
- A Service-oriented Approach to Security - Concepts and Issues (2007) (1)
- Distributed Database Design Using the Entity-Relationship Model (1983) (1)
- A Geographical Information System for Volcanic Hazard Modelling (2006) (1)
- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities (2006) (1)
- Decision-making in policy governed human-autonomous systems teams (2017) (1)
- Emerging Research Trends (2009) (1)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part V (2020) (1)
- Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII (2019) (1)
- Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis: 12th International Conference, SCSM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (1)
- Provenance-Based Scientific Workflow Search (2017) (1)
- Panel session: Authors' rights and copyright protection (1996) (1)
- Security of cellular networks position paper (2020) (1)
- Transactions on Computational Science XXXVI: Special Issue on Cyberworlds and Cybersecurity (2020) (1)
- Security of new generation computing systems (2014) (1)
- Enhanced nested-inherited index for OODBMS (1995) (1)
- Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems (2009) (1)
- Query Mesh: MultiRoute (2009) (1)
- Network and System Security : 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings (2012) (1)
- The ADKMS Knowledge Acquisition System (1992) (1)
- Access Control for Business Processes (2009) (1)
- Online Adversarial Learning of Reactor State (2018) (1)
- Security for Content Distribution Networks – Concepts, Systems and Research Issues (2007) (1)
- Mathematical Software – ICMS 2020: 7th International Conference, Braunschweig, Germany, July 13–16, 2020, Proceedings (2020) (1)
- Sanctioning Mechanisms in Virtual Communities (2006) (1)
- On the Selection of Optimal Index Configurations in Object-Oriented Databases (1993) (1)
- Analysis of Adversarial Learning of Reactor State (2018) (1)
- Intelligent IoT Systems for Civil Infrastructure Monitoring: A Research Roadmap (2020) (1)
- Privacy-preserving assessment of location data trustworthiness (2011) (1)
- User Preference Based Link Inference for Social Network (2016) (1)
- Statistically-enhancing the diagnosis of packet losses in WSNs (2017) (1)
- Reversible Computation: 12th International Conference, RC 2020, Oslo, Norway, July 9-10, 2020, Proceedings (2020) (1)
- Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security (1996) (1)
- Pruning Deep Neural Networks for Efficient Edge Computing in Internet of Things: A Structural Health Monitoring Case Study (2019) (1)
- Aggregating uncertain access risk estimations from different sources invited paper (2009) (1)
- Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings (2020) (1)
- Control Systems for Geospatial Data and Applications (2007) (1)
- A Knowledge Based Information System (1992) (1)
- AQA: An Adaptive Quality Assessment Framework for Online Review Systems (2020) (1)
- Provenance-based confidence policy management in data streams (2009) (1)
- On the Impact of Generative Policies on Security Metrics (2019) (1)
- Architectural issues for a location-aware role-based access control system (2006) (1)
- Introducing cooperation and actions in amalgamated knowledge bases (2001) (1)
- Cloud Computing and Security (2018) (1)
- Proceedings of the 9th international conference on Advances in Spatial and Temporal Databases (2005) (1)
- Perspectives of System Informatics: 12th International Andrei P. Ershov Informatics Conference, PSI 2019, Novosibirsk, Russia, July 2–5, 2019, Revised Selected Papers (2019) (1)
- A MODULAR FRAMEWORK FOR ADMINISTERING SPATIAL CONSTRAINTS IN CONTEXT-AWARE RBAC (2006) (1)
- Applications of Evolutionary Computation: 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Seville, Spain, April 15–17, 2020, Proceedings (2020) (1)
- Financial Cryptography and Data Security: 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers (2020) (1)
- Natural Language Processing and Information Systems: 25th International Conference on Applications of Natural Language to Information Systems, NLDB 2020, Saarbrücken, Germany, June 24–26, 2020, Proceedings (2020) (1)
- Machine Learning and Medical Engineering for Cardiovascular Health and Intravascular Imaging and Computer Assisted Stenting: First International Workshop, MLMECH 2019, and 8th Joint International Workshop, CVII-STENT 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 13, 2019, Proc (2019) (1)
- A linguistic framework for querying dimensional data (2001) (1)
- A trigger-based approach for communication personalization (2004) (1)
- Digital identity management and protection (2006) (1)
- Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries: 5th International Workshop, BrainLes 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 17, 2019, Revised Selected Papers, Part I (2020) (1)
- Securing Documents with Author-X (2001) (1)
- Security mechanisms for content distribution networks (2006) (1)
- Collaborative Computing: Networking, Applications and Worksharing 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, ... and Telecommunications Engineering (2009) (1)
- Orchestration or Automation: Authentication Flaw Detection in Android Apps (2022) (1)
- A framework for contractual resource sharing (2004) (1)
- Fine-grained encryption-based access control for big data (2012) (1)
- A secure architecture design based on code minimization and application isolation (2013) (1)
- Object-Oriented Databases (1999) (1)
- Query Mesh: An Efficient Multi-Route Approach to Query Optimization (2008) (1)
- Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs (2022) (1)
- Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices (2021) (1)
- ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones (2020) (1)
- Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I (2020) (1)
- CLP (X) as a framework for action and deduction (1992) (1)
- Developing A Compelling Vision for Winning the Cybersecurity Arms Race (2020) (1)
- Trusted enforcement of contextual access control (2011) (1)
- Remote End-to-End Voting Scheme (2014) (1)
- A set‐oriented method definition language for object databases and its semantics (2003) (1)
- A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications (2017) (1)
- Letter to the editor [2] (2007) (1)
- Fault Tolerance and Recovery in Mobile Computing Systems (1997) (1)
- Authorization Strategies for Virtualized Environments in Grid Computing Systems (2006) (1)
- Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories (2018) (1)
- Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems (1993) (1)
- A FRAMEWORK FOR MANAGEMENT OF SECURE AND ADAPTIVE WORKFLOWS (2005) (1)
- Theoretical Aspects of Computing – ICTAC 2020: 17th International Colloquium, Macau, China, November 30 – December 4, 2020, Proceedings (2020) (1)
- Image Analysis and Recognition: 17th International Conference, ICIAR 2020, Póvoa de Varzim, Portugal, June 24–26, 2020, Proceedings, Part I (2020) (1)
- Supporting Multi-Dimensional Trustworthiness for Grid Workflows (2004) (1)
- Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation (1990) (1)
- Theory and Applications of Satisfiability Testing – SAT 2020: 23rd International Conference, Alghero, Italy, July 3–10, 2020, Proceedings (2020) (1)
- Computer Security - ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (1996) (1)
- A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living (2021) (1)
- Computer Aided Verification: 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part II (2020) (1)
- Advanced Privacy-Preserving Data Management and Analysis (2010) (1)
- Network and System Security (2012) (1)
- Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries (2001) (1)
- Context-aware Adaptation of Access Control Policies for Crisis Management (1)
- A secure framework for publishing virtual community contracts (2006) (1)
- A Knowledge-Based Approach to Visual Information (2002) (1)
- Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality (2017) (1)
- Algorithms and Discrete Applied Mathematics: 6th International Conference, CALDAM 2020, Hyderabad, India, February 13–15, 2020, Proceedings (2020) (0)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part III (2020) (0)
- MIST 2017: 9th International Workshop on Managing Insider Security Threats (2017) (0)
- Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet (2010) (0)
- Message from SEPT Symposium Organizing Committee (2015) (0)
- Security with Privacy-A Research Agenda ( Invited Paper ) (2014) (0)
- GeoInformatica welcomes a new co-editor-in-chief (2016) (0)
- Special issue: best papers of VLDB 2010 (2012) (0)
- JoDS volume 2 - Guest editorial (2005) (0)
- Continuous Intersection JoinsOver Moving Objects (2008) (0)
- Web Services Document Security (2004) (0)
- Pattern Recognition: 12th Mexican Conference, MCPR 2020, Morelia, Mexico, June 24–27, 2020, Proceedings (2020) (0)
- Letters on Privacy in Location-based Services Privacy-Preserving Techniques for Location-based Services by Elisa Bertino Privacy in Location-aware Systems (2009) (0)
- A Comprehensive Access Control System for Scientific Applications (2013) (0)
- A Hybrid Approach toPrivate Record Linkage (2008) (0)
- Proceedings of the VLDB Endowment, Volume 3 (2010) (0)
- Exploiting User-Profiles for the Selective Dissemination of XML Documents (2004) (0)
- Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (2020) (0)
- Message from the General Chairs BigDataSecurity/HPSC/IDS 2021 (2021) (0)
- Unstructured Content Analysis & Classification System for the IRS (2020) (0)
- Exam: an environment for xacml policy analysis and management (2010) (0)
- ARES Conference - Message from ARES Conference Officers (2012) (0)
- Networks — Concepts, Systems and Research Issues (2007) (0)
- Trustworthy objects (2003) (0)
- IEEE IRI 2012 INTERNATIONAL TECHNICAL PROGRAM COMMITTEE (2012) (0)
- Authenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and (2012) (0)
- Design, Operation and Evaluation of Mobile Communications: First International Conference, MOBILE 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- Proceedings of the VLDB Endowment (2010) (0)
- Object-oriented methodologies and systems : International Symposium, ISOOMS '94, Palermo, Italy, September 21-22, 1994 : proceedings (1994) (0)
- A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized . COMPREHENSIVE ONLINE PRIVACY POLICY MANAGEMENT (2007) (0)
- Session details: Short Papers (2017) (0)
- Secure kNN Query Processing in Untrusted (2014) (0)
- Reinforcement and transfer learning for distributed analytics in fragmented software defined coalitions (2021) (0)
- Cloud Computing and Security (2018) (0)
- Access control techniques and methodologies for grid systems (2004) (0)
- Cooperative Design, Visualization, and Engineering: 16th International Conference, CDVE 2019, Mallorca, Spain, October 6–9, 2019, Proceedings (2019) (0)
- Digital identity management (2006) (0)
- Session details: Invited industry and application papers (2011) (0)
- Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II (2020) (0)
- MIST 2015: 7th International Workshop on Managing Insider Security Threats (2015) (0)
- Editor's Note (2017) (0)
- Session details: Keynote address 1 (2014) (0)
- Monitoring DBMS activity for detecting data exfiltration by insiders (2015) (0)
- Message from the General Chairs: IEEE BigDataSecurity/HPSC/IDS 2020 (2020) (0)
- Integrity of graphs without leaking (2009) (0)
- Panel Discussion: Role-Based Access Control and Next-Generation Security Models (1995) (0)
- Neural Information Processing: 27th International Conference, ICONIP 2020, Bangkok, Thailand, November 23–27, 2020, Proceedings, Part II (2020) (0)
- Beyond the Horizon of Computability: 16th Conference on Computability in Europe, CiE 2020, Fisciano, Italy, June 29–July 3, 2020, Proceedings (2020) (0)
- Multimedia Database Support for Digital Libraries (Dagstuhl Seminar 99351) (2021) (0)
- Privacy Pitfalls and Solutions in Trust Negotiations (2005) (0)
- Message from the ICDE 2014 program committee and general chairs (2014) (0)
- Towards Authenticated Objects (2013) (0)
- Message from the General Chairs (2018) (0)
- OO Databases and applications (selected papers from ICDE'98) (1999) (0)
- Intelligent Human Computer Interaction: 11th International Conference, IHCI 2019, Allahabad, India, December 12–14, 2019, Proceedings (2020) (0)
- AI-powered Network Security: Approaches and Research Directions (2021) (0)
- SPECIAL SECTION ON SOCIO-TECHNICAL ENVIRONMENT OF SOFTWARE DEVELOPMENT PROJECTS (2011) (0)
- A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases (1997) (0)
- Computer Aided Systems Theory – EUROCAST 2019: 17th International Conference, Las Palmas de Gran Canaria, Spain, February 17–22, 2019, Revised Selected Papers, Part II (2020) (0)
- Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations (2004) (0)
- A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models (2019) (0)
- High Performance Computing: 35th International Conference, ISC High Performance 2020, Frankfurt/Main, Germany, June 22–25, 2020, Proceedings (2020) (0)
- Advances in Computer Games: 16th International Conference, ACG 2019, Macao, China, August 11–13, 2019, Revised Selected Papers (2020) (0)
- Logic-Based Program Synthesis and Transformation: 29th International Symposium, LOPSTR 2019, Porto, Portugal, October 8–10, 2019, Revised Selected Papers (2020) (0)
- Information Services: Myth or Silver Bullet? (2009) (0)
- Session details: Database privacy and security (2007) (0)
- Systematic Control and Management of Data Integrity, Quality and Provenance for Command and Control Applications (2010) (0)
- Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (2016) (0)
- Secure Object Deletion and Garbage Collection in Multilevel Object Bases (1999) (0)
- Frontiers in Algorithmics: 14th International Workshop, FAW 2020, Haikou, China, October 19-21, 2020, Proceedings (2020) (0)
- A proposed proxy-based multicloud computing framework allows dynamic, on- the-fly collaborations and resource sharing among cloud-based services, addressing trust, policy, and privacy issues without preestablished collabora- tion agreements or standardized interfaces. (2013) (0)
- PSAC: privilege state-based access control (2010) (0)
- Compliance auditing in data stream management systems (2009) (0)
- Virtual, Augmented and Mixed Reality. Industrial and Everyday Life Applications: 12th International Conference, VAMR 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (0)
- The design of a multimedia office filing system (1988) (0)
- Knowledge Management for Heterogeneous Information Exchange (2002) (0)
- A Computer-Aided System for Dynamic Pottery Classification Using XML (2012) (0)
- Specification and Verification of a Context-Based Access Control Framework for Cyber Physical Systems (2012) (0)
- FTDCS 2008 Committees (2008) (0)
- Impact of Henry system of classification on the entropy of fingerprint images (2012) (0)
- Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies (2017) (0)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part I (2020) (0)
- Session details: Session 2: Access Control (2017) (0)
- Message from the Blockchain 2020 General Chairs (2020) (0)
- Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings (2020) (0)
- Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part I (2020) (0)
- DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems (2022) (0)
- Progress in Cryptology - AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings (2020) (0)
- 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015 (2015) (0)
- 2007 Annual Index IEEE Security & Privacy, Volume 6 (2007) (0)
- knowledge and data engineering A publication of the IEEE Computer Society (2005) (0)
- Efficient and Selective Publishing of Hierarchically Structured Data (2009) (0)
- Euro-Par 2019: Parallel Processing Workshops: Euro-Par 2019 International Workshops, Göttingen, Germany, August 26–30, 2019, Revised Selected Papers (2020) (0)
- PASSAT 2009 Organizing and Program Committee (2009) (0)
- Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016 (2016) (0)
- Session details: Cloud and BigData Security (2015) (0)
- Algorithmic Aspects in Information and Management: 14th International Conference, AAIM 2020, Jinhua, China, August 10–12, 2020, Proceedings (2020) (0)
- Current Trends in Web Engineering: ICWE 2019 International Workshops, DSKG, KDWEB, MATWEP, Daejeon, South Korea, June 11, 2019, Proceedings (2020) (0)
- Editorial Advisory Board (2016) (0)
- ACM/Springer Mobile Networks and Applications (MONET) Special Issue on “Collaborative Computing: Networking, Applications and Worksharing” (2012) (0)
- Computer Performance Engineering: 16th European Workshop, EPEW 2019, Milan, Italy, November 28–29, 2019, Revised Selected Papers (2020) (0)
- Adaptive Instructional Systems: Second International Conference, AIS 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- ECOOP 2000 - object-oriented programming : 14th European Conference, Sophia Antipolis and Cannes, France, June 12-16, 2000 : proceedings (2000) (0)
- Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (2017) (0)
- Session details: Data flow and access control (2011) (0)
- HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks (2022) (0)
- Making access control more usable (2002) (0)
- Retrieval of Semistructured Web Data (2003) (0)
- Bio-Key : Privacy Preserving Biometric Authentication (2007) (0)
- Role-based access control and next-generation security models (panel) (1996) (0)
- Security and Trust Management: 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings (2020) (0)
- Subspace Embedding Based New Paper Recommendation (2022) (0)
- WI 2009 Title Page iii (2009) (0)
- Privacy risk and scalability of differentially-private data anonymization (2012) (0)
- Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers (2009) (0)
- Cloud Computing and Security (2018) (0)
- Biometric Recognition's Role in Identity Management (2010) (0)
- Code-Based Cryptography: 8th International Workshop, CBCrypto 2020, Zagreb, Croatia, May 9–10, 2020, Revised Selected Papers (2020) (0)
- Security and Communication Networks (SCN), Wiley Online Library Special Issue on “Defending Against Insider Threats and Internal Data Leakage” http://wileyonlinelibrary.com/journal/sec (2010) (0)
- Message from the SEPT Organizing Committee (2016) (0)
- Integer Programming and Combinatorial Optimization: 21st International Conference, IPCO 2020, London, UK, June 8–10, 2020, Proceedings (2020) (0)
- Policies and IT technologies: a puzzle of two pieces (2006) (0)
- Privacy-enhancing features of identidroid (2015) (0)
- Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks (2022) (0)
- VLDB Endowment Board of Trustees (2007) (0)
- Guest Editors' Introduction (2004) (0)
- Proceedings of the 2017 International Workshop on Managing Insider Security Threats (2017) (0)
- Springl 2008 : proceedings of the SIGSPATIAL ACM Workshop on Security and Privacy in GIS and LBS : Irvine, California, USA, November 4, 2008 (2008) (0)
- Hybrid Differentially-Private String Matching (2018) (0)
- An excellent venue for multidisciplinary research in civil and infrastructure engineering (2021) (0)
- An indexing approach for multimedia digital libraries (2001) (0)
- Location-aware Authentication and Authorization - Concepts and Issues (2012) (0)
- Purdue University Trust Negotiation in Identity Management (2005) (0)
- Towards a Neural-Symbolic Generative Policy Model (2019) (0)
- Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints (2006) (0)
- Plenary Panel Session at QRS 2015: Security of IoT (Internet of Things) (2015) (0)
- A database management system for CAD applications support (Italian) (1989) (0)
- SPRINGL 2008 Workshop Report ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS (2008) (0)
- 2014 International Conference on Collaboration Technologies and Systems, CTS 2014, Minneapolis, MN, USA, May 19-23, 2014 (2014) (0)
- Proceedings - 3rd International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies and Services, CENTRIC 2010: Preface (2010) (0)
- Core Role Based Access Control ( RBAC ) mechanism for MySQL by Ian Molloy (2006) (0)
- AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN (2023) (0)
- Performance Evaluation and Benchmarking for the Era of Cloud(s): 11th TPC Technology Conference, TPCTC 2019, Los Angeles, CA, USA, August 26, 2019, Revised Selected Papers (2020) (0)
- Database Monitoring in U-Datalog (1995) (0)
- Session details: Keynote Address (2010) (0)
- Formal Methods and Software Engineering: 21st International Conference on Formal Engineering Methods, ICFEM 2019, Shenzhen, China, November 5–9, 2019, Proceedings (2019) (0)
- An Automated Framework for Accelerating Numerical Algorithms on Reconfigurable Platforms Using Algorithmic/Architectural Optimization (2009) (0)
- Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I (2020) (0)
- Image Analysis and Recognition: 17th International Conference, ICIAR 2020, Póvoa de Varzim, Portugal, June 24–26, 2020, Proceedings, Part II (2020) (0)
- Design, User Experience, and Usability. Design for Contemporary Interactive Environments: 9th International Conference, DUXU 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (0)
- Cloud Computing and Security (2017) (0)
- Cooperative Design, Visualization, and Engineering: 17th International Conference, CDVE 2020, Bangkok, Thailand, October 25–28, 2020, Proceedings (2020) (0)
- CCS 2017: Women in Cyber Security (CyberW) Workshop (2017) (0)
- Agricultural and Water Harvesting Opportunities in Kenya, via a Crowd-Sourced, Citizen Science Hybrid Paradigm (2014) (0)
- Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008 (2008) (0)
- Proceedings of the 2017 Workshop on Women in Cyber Security (2017) (0)
- Welcome Message from Congress 2020 General Chairs (2020) (0)
- Message from HUMA Symposium Organizing Committee (2015) (0)
- Session details: Inclusive Excellence (2017) (0)
- Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I (2020) (0)
- Special issue on Security in the World Wide Web (WWW) (1997) (0)
- C R ] 22 A pr 2 01 5 Differentially Private k-Means Clustering (2015) (0)
- Cloud Computing and Security (2018) (0)
- Trends in Functional Programming: 20th International Symposium, TFP 2019, Vancouver, BC, Canada, June 12–14, 2019, Revised Selected Papers (2020) (0)
- Privacy-Preserving Receipt Management with NFC Phones (2011) (0)
- CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection (2022) (0)
- A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System (2018) (0)
- Security and Privacy for Emerging IoT and CPS Domains (2022) (0)
- ABSTRACT Access Control Enforcement for Conversation-based Web Services (2006) (0)
- KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications (2022) (0)
- HCI in Business, Government and Organizations: 7th International Conference, HCIBGO 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- Formal Techniques for Distributed Objects, Components, and Systems: 40th IFIP WG 6.1 International Conference, FORTE 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15–19, 2020, Proceedings (2020) (0)
- Design, User Experience, and Usability. Interaction Design: 9th International Conference, DUXU 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (0)
- Inheritance in a Deductive Object Database Language with Updates (1999) (0)
- Web Engineering: 20th International Conference, ICWE 2020, Helsinki, Finland, June 9–12, 2020, Proceedings (2020) (0)
- Access Control for Web Services (2009) (0)
- Trust-X: a trust negotiation proposal (2004) (0)
- Parallel Processing and Applied Mathematics (2011) (0)
- Keynote: Research Challenges and Opportunities in IoT Security (2017) (0)
- C CL LO OU UD D 2 20 00 09 9 O Or rg ga an ni iz zi in ng g C Co om mm mi it tt te ee e CLOUD 2009 General Chair (2009) (0)
- A roadmap for privacy-enhanced secure data provenance (2014) (0)
- Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms (2014) (0)
- Approximation techniques for indexing two-dimensional constraint databases (1999) (0)
- JTAM - A Joint Threshold Administration Model (2010) (0)
- Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings (2008) (0)
- Review - Supporting Valid-Time Indeterminacy (2000) (0)
- Panel: Using information re-use and integration principles in big data (2012) (0)
- Editorial: Special Issue on Data Transparency—Uses Cases and Applications (2022) (0)
- Application and Theory of Petri Nets and Concurrency: 41st International Conference, PETRI NETS 2020, Paris, France, June 24–25, 2020, Proceedings (2020) (0)
- Development of Defenses against False Data Injection Attacks for Nuclear Power Plants. (2018) (0)
- Human Aspects of IT for the Aged Population. Healthy and Active Aging: 6th International Conference, ITAP 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (0)
- Continuous security policy enforcement in streaming environments (2008) (0)
- IEEE ICCC 2018 Reviewers (2018) (0)
- Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings (2019) (0)
- Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I (2020) (0)
- Cloud Computing and Security (2016) (0)
- SPECIAL SECTION on Rule Representation Guest Editors' Introduction: Rule Representation, Interchange, and Reasoning in Distributed, (2010) (0)
- Title, Foreword (1980) (0)
- Database Intrusion Detection and Response (2008) (0)
- WEB-based management and representation of spatial and geographic data (2004) (0)
- a n a ccess-Control f ramework for Ws-bPel (2008) (0)
- An index allocation tool for object‐oriented database systems (2000) (0)
- Guest editorial: Information reuse, integration, and reusable systems (2014) (0)
- CRIS - Computational Research Infrastructure for Science Invited Paper (2013) (0)
- Editorial (2014) (0)
- Privacy preserving access control for third-party data management systems (2012) (0)
- Editor's Note (2016) (0)
- DEPENDABLE AND SECURE COMPUTING A publication of the IEEE Computer Society (2011) (0)
- Information Security and Cryptology: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers (2020) (0)
- EDITOR'S NOTE. (2017) (0)
- Information Retrieval: 26th China Conference, CCIR 2020, Xi'an, China, August 14–16, 2020, Proceedings (2020) (0)
- POSTER: Performance signatures of mobile phone browsers (2013) (0)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part VI (2020) (0)
- Internet Computing Editorial Calendar (2004) (0)
- Artificial Intelligence in HCI: First International Conference, AI-HCI 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- General chair and PC chairs' welcome (2017) (0)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part II (2020) (0)
- Welcome from the Program Chairs COMPSAC 2009 (2009) (0)
- Artificial Evolution: 14th International Conference, Évolution Artificielle, EA 2019, Mulhouse, France, October 29–30, 2019, Revised Selected Papers (2020) (0)
- Performance signatures of mobile phone browsers. (2013) (0)
- Proceedings of the 6th international conference on Network and System Security (2012) (0)
- Human-Computer Interaction. Multimodal and Natural Interaction: Thematic Area, HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (0)
- Chapter VI Web Content Filtering (2019) (0)
- Protecting information in the Web-position paper (1999) (0)
- Towards Deductice Object Databases (1995) (0)
- Policy based Ensembles for applying ML on Big Data (2019) (0)
- The Trajectory of Current and Future Knowledge Market Research: Insights from the First KredibleNet Workshop (2015) (0)
- Protecting XML Documents: Position Paper (2000) (0)
- A MATHEMATICAL MODEL FOR OPTIMAL INDEXING IN OBJECT-ORIENTED DATABASES (2007) (0)
- Editorial: Introduction to Data Security and Privacy (2016) (0)
- Proceedings of IEEE COMPSAC 2009 (2009) (0)
- Can an inter-disciplinary research community on location privacy be successful? (2009) (0)
- Learning information release policies for preventing intersection attacks (2017) (0)
- Intelligent Computing Theories and Application: 15th International Conference, ICIC 2019, Nanchang, China, August 3–6, 2019, Proceedings, Part I (2019) (0)
- CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks (2017) (0)
- Biomedical Image Registration: 9th International Workshop, WBIR 2020, Portorož, Slovenia, December 1–2, 2020, Proceedings (2020) (0)
- Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013 (2014) (0)
- Guest editorial: Information reuse, integration, and reusable systems (2014) (0)
- BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17 , 2014 The University of Texas at Dallas (2015) (0)
- Session details: Web security (2013) (0)
- Computational Complexity and Property Testing: On the Interplay Between Randomness and Computation (2020) (0)
- Efficient Privacy Preserving Protocols for Decentralized Computation of Reputation (2009) (0)
- IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs (2020) (0)
- Artificial Intelligence and Security (2019) (0)
- On-the-fly collaboration for legacy business process systems in an open service environment (2019) (0)
- 08 A FRAMEWORK FOR SPECIFICATION AND VERIFICATION OF GENERALIZED SPATIO-TEMPORAL ROLE BASED ACCESS CONTROL MODEL (2007) (0)
- Policy Evaluation With Dynamic Context Handling ( Extended Abstract ) (2015) (0)
- Privacy enhancing techniques for security. (2020) (0)
- Role-based access control to outsourced data in could computing (2013) (0)
- Mathematics of Program Construction: 13th International Conference, MPC 2019, Porto, Portugal, October 7–9, 2019, Proceedings (2019) (0)
- IEEE IRI 2014 message from program co-chairs (2014) (0)
- Preface (1992) (0)
- Pattern Recognition Applications and Methods: 8th International Conference, ICPRAM 2019, Prague, Czech Republic, February 19-21, 2019, Revised Selected Papers (2020) (0)
- Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II (2019) (0)
- Human Interface and the Management of Information. Designing Information: Thematic Area, HIMI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (0)
- Tests and Proofs: 14th International Conference, TAP 2020, Held as Part of STAF 2020, Bergen, Norway, June 22–23, 2020, Proceedings (2020) (0)
- Session details: Access control in novel systems (2007) (0)
- Combinatorial Image Analysis: 20th International Workshop, IWCIA 2020, Novi Sad, Serbia, July 16–18, 2020, Proceedings (2020) (0)
- Development of a Multimedia Jnformation S3stem for an Offke Environment (1994) (0)
- Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (2015) (0)
- Algorithms and Models for the Web Graph: 17th International Workshop, WAW 2020, Warsaw, Poland, September 21–22, 2020, Proceedings (2020) (0)
- Protection and administration of XML data sources q (2002) (0)
- Guest editors' introduction (2005) (0)
- Simeon - Secure Federated Machine Learning Through Iterative Filtering (2021) (0)
- Efficient query processing for rich and diverse real-time data (2009) (0)
- Databases Theory and Applications: 31st Australasian Database Conference, ADC 2020, Melbourne, VIC, Australia, February 3–7, 2020, Proceedings (2020) (0)
- Advanced Techniques for Web Content Filtering (2008) (0)
- Benchmarking, Measuring, and Optimizing: Second BenchCouncil International Symposium, Bench 2019, Denver, CO, USA, November 14–16, 2019, Revised Selected Papers (2020) (0)
- The Persistent Problem of Software Insecurity (2022) (0)
- Quality of Service in Video Databases (2003) (0)
- Artificial Intelligence and Security (2019) (0)
- Support Multi-Dimensional Trustworthiness for Grid Workflow (2004) (0)
- Secure Publishing Techniques (2009) (0)
- Service-Oriented and Cloud Computing: 8th IFIP WG 2.14 European Conference, ESOCC 2020, Heraklion, Crete, Greece, September 28–30, 2020, Proceedings (2020) (0)
- SPECIAL ISSUE ON AMBIENT HAPTIC SYSTEMS (2009) (0)
- Genetic Programming: 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Seville, Spain, April 15–17, 2020, Proceedings (2020) (0)
- ARES Conference: Welcome Message from the ARES Conference Officers (2012) (0)
- A I t e r n at i ve C o r re c t n e s s C; r i t e r i a for Concurrent Execution of Transactions in Multilevel Secure Databases (1996) (0)
- Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II (2020) (0)
- COMPSAC 2015 Symposium on Security, Privacy and Trust in Computing (SEPT) Message from SEPT Organizing Committee (2015) (0)
- 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012 (2012) (0)
- Network and information systems security (2006) (0)
- A role-involved purpose-based access control model (2011) (0)
- Accountability for grid computing systems (2011) (0)
- DBMask: encrypted query processing over an encrypted database (2013) (0)
- Policies models and tools for collaborative applications (2007) (0)
- Special issue: best papers of VLDB 2010 (2012) (0)
- Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II (2020) (0)
- Index Con gurations in Object-Oriented Databases (2007) (0)
- Foreword (2007) (0)
- Special issue ESORICS 2021 (2022) (0)
- CERIAS Tech Report 2011-19 Specification and Verification of a Context-Based Access Control Framework for Cyber Physical Systems (2011) (0)
- Distributed Applications and Interoperable Systems: 20th IFIP WG 6.1 International Conference, DAIS 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15–19, 2020, Proceedings (2020) (0)
- Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009 (2009) (0)
- Proceedings of the 4th ACM workshop on Digital identity management (2008) (0)
- ELISA BERTINO , GIOVANNA GUERRINI AND LUCARUSCAOBJECT EVOLUTION IN OBJECT (0)
- EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry (2022) (0)
- Review - An Authorization Mechanism for a Relational Data Base System (1999) (0)
- Introduction to Data Science and Engineering (2016) (0)
- Combinatorial Optimization: 6th International Symposium, ISCO 2020, Montreal, QC, Canada, May 4–6, 2020, Revised Selected Papers (2020) (0)
- Combinatorial Optimization and Applications: 14th International Conference, COCOA 2020, Dallas, TX, USA, December 11–13, 2020, Proceedings (2020) (0)
- Computational Science – ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV (2020) (0)
- 1 Security for Content Distribution Networks — Concepts , Systems and Research Issues (2007) (0)
- Deduct ive Object Databases (0)
- Preserving privacy in policy-based content dissemination (2010) (0)
- Culture and Computing: 8th International Conference, C&C 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- A CONSTRAINT − BASED APPROACH FOR THE AUTHORING OF MULTI − TOPIC MULTIMEDIA PRESENTATIONS ( FriPmPO 1 ) Author ( s ) : (2005) (0)
- 1 An Optimal Conflict Resolution Strategy for Event-Driven Role Based Access Control Policies (2005) (0)
- CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy: Foreword (2011) (0)
- Attribute-Based Access Control ? (2007) (0)
- HCI in Games: Second International Conference, HCI-Games 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (2020) (0)
- Privacy-preserving authentication of trees and graphs (2013) (0)
- Session details: Access control applications (2012) (0)
- Welcome message from the organizers (2016) (0)
- Implementation Challenges in Spatio-temporal Multigranularity (2009) (0)
- A Comprehensive Framework for Secure Outsourcing of XML Data (2008) (0)
- A CRIS Data Science Investigation of Scientific Workflows of Agriculture Big Data and its Data Curation Elements (2014) (0)
- Architecture of Computing Systems – ARCS 2020: 33rd International Conference, Aachen, Germany, May 25–28, 2020, Proceedings (2020) (0)
- Efficient and flexible attribute policy based key management (2011) (0)
- Privacy-Preserving Accountable Accuracy Management Systems (PAAMS) (2009) (0)
- Learning and Collaboration Technologies. Human and Technology Ecosystems: 7th International Conference, LCT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (2020) (0)
- Generating Client Side Policies for Cyber-Physical Safety (2019) (0)
- Review - Data Mining: An Overview from a Database Perspective (2000) (0)
- Intelligent Database Environment for Advanced Applications Idea Consolidated Specification of Chimera (cm and Cl) Intelligent Database Environment for Advanced Applications Idea Contents Esprit Project 6333 Intelligent Database Environment for Advanced Applications (1993) (0)
- Introducing dynamic behavior in amalgamated knowledge bases (2002) (0)
- 2020 IEEE World Congress on Services Message from the Steering Committee Chair (2019) (0)
- DELIVERABLE D 3 Software architecture of the EUFORBIA demonstrator (0)
- HAPTICS A joint publication of the IEEE Computer Society (2008) (0)
- HCI in Mobility, Transport, and Automotive Systems. Automated Driving and In-Vehicle Experience Design: Second International Conference, MobiTAS 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I (2020) (0)
- Fingerprint sensor interoperability: performance evaluation of a multi-sensor system (2008) (0)
- MANAGEMENT IN FEDERATED INFORMATION SHARING (2006) (0)
- Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011 (2011) (0)
- Languages and Compilers for Parallel Computing: 30th International Workshop, LCPC 2017, College Station, TX, USA, October 11–13, 2017, Revised Selected Papers (2019) (0)
- Guest Editor's Introduction: Special Section on EdgeAI as a Service (2022) (0)
- Method Dispatching in Object Systems with Multiple Class Direct Membership (2007) (0)
- Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels (2000) (0)
- Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions (2021) (0)
- Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations' (2001) (0)
- FiPS: a file system provenance (2013) (0)
- Computer Aided Systems Theory – EUROCAST 2019: 17th International Conference, Las Palmas de Gran Canaria, Spain, February 17–22, 2019, Revised Selected Papers, Part I (2020) (0)
- Security and privacy of electronic health information systems (2015) (0)
- Attribute Re(cid:12)nement in a Multigranular Temporal Object Data Model ⋆ (2009) (0)
- Developments in Language Theory: 24th International Conference, DLT 2020, Tampa, FL, USA, May 11–15, 2020, Proceedings (2020) (0)
This paper list is powered by the following services:
Other Resources About Elisa Bertino
What Schools Are Affiliated With Elisa Bertino?
Elisa Bertino is affiliated with the following schools: