Seguir
Elisa Bertino
Elisa Bertino
Professor of Computer Science, Purdue University
Dirección de correo verificada de purdue.edu - Página principal
Título
Citado por
Citado por
Año
Challenges and opportunities with Big Data 2011-1
D Agrawal, P Bernstein, E Bertino, S Davidson, U Dayal, M Franklin, ...
16602011
TRBAC: A temporal role-based access control model
E Bertino, PA Bonatti, E Ferrari
Proceedings of the fifth ACM workshop on Role-based access control, 21-30, 2000
13142000
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
11912004
A generalized temporal role-based access control model
JBD Joshi, E Bertino, U Latif, A Ghafoor
IEEE transactions on knowledge and data engineering 17 (1), 4-23, 2005
8252005
The specification and enforcement of authorization constraints in workflow management systems
E Bertino, E Ferrari, V Atluri
ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999
8001999
Association rule hiding
VS Verykios, AK Elmagarmid, E Bertino, Y Saygin, E Dasseni
IEEE Transactions on knowledge and data engineering 16 (4), 434-447, 2004
7042004
GEO-RBAC: a spatially aware RBAC
ML Damiani, E Bertino, B Catania, P Perlasca
ACM Transactions on Information and System Security (TISSEC) 10 (1), 2-es, 2007
6832007
Botnets and internet of things security
E Bertino, N Islam
Computer 50 (2), 76-79, 2017
6422017
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
6322005
Database security-concepts, approaches, and challenges
E Bertino, R Sandhu
IEEE Transactions on Dependable and secure computing 2 (1), 2-19, 2005
6172005
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX …, 1999
6121999
Quality control in crowdsourcing systems: Issues and directions
M Allahbakhsh, B Benatallah, A Ignjatovic, HR Motahari-Nezhad, ...
IEEE Internet Computing 17 (2), 76-81, 2013
5252013
A model of authorization for next-generation database systems
F Rabitti, E Bertino, W Kim, D Woelk
ACM Transactions on Database Systems (TODS) 16 (1), 88-131, 1991
5001991
Efficient k-Anonymization Using Clustering Techniques
JW Byun, A Kamra, E Bertino, N Li
Advances in Databases: Concepts, Systems and Applications: 12th …, 2007
4852007
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
4802010
Secure and selective dissemination of XML documents
E Bertino, E Ferrari
ACM Transactions on Information and System Security (TISSEC) 5 (3), 290-331, 2002
4662002
A unified framework for enforcing multiple access control policies
S Jajodia, P Samarati, VS Subrahmanian, E Bertino
ACM Sigmod Record 26 (2), 474-485, 1997
4311997
Hiding association rules by using confidence and support
E Dasseni, VS Verykios, AK Elmagarmid, E Bertino
Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001
4302001
Preserving user location privacy in mobile data management infrastructures
R Cheng, Y Zhang, E Bertino, S Prabhakar
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
4232006
Composite objects revisited
W Kim, E Bertino, JF Garza
Proceedings of the 1989 ACM SIGMOD international conference on Management of …, 1989
4191989
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20