-
2
-
-
80051803315
-
Data, data everywhere
-
25 February Downladed on April 30 2012
-
"Data, data everywhere", The Economist, 25 February 2010, available at http://www.economist.com/node/15557443 (Downladed on April 30, 2012).
-
(2010)
The Economist
-
-
-
3
-
-
85026966400
-
-
https://www.cylab.cmu.edu/research/projects/2010/MERITITL. html
-
-
-
-
5
-
-
84959547569
-
Data security-challenges and research opportunities
-
W. Jonker and M. Pektovic, eds., LNCS 8425
-
E. Bertino, Data Security-Challenges and Research Opportunities. SDM 2013 (W. Jonker and M. Pektovic, eds.), LNCS 8425.
-
(2013)
SDM
-
-
Bertino, E.1
-
6
-
-
85027002219
-
Dbsafe-An anomaly detection system to protect databases from exfiltration attempts
-
April
-
A. Sallam, E. Bertino, et al., DBSAFE-An Anomaly Detection System to Protect Databases from Exfiltration Attempts, Submitted for publication in IEEE Systems, April 2015.
-
(2015)
Submitted for Publication in IEEE Systems
-
-
Sallam, A.1
Bertino, E.2
-
7
-
-
19944380112
-
Database security-concepts
-
2-19, January-March
-
E. Bertino, R. Sandhu, Database Security-Concepts, Approaches, and Challeges, IEEE Transactions on Dependable and Security Computing 2(1): 2-19, January-March 2005.
-
(2005)
Approaches, and Challeges, IEEE Transactions on Dependable and Security Computing
, vol.2
, pp. 1
-
-
Bertino, E.1
Sandhu, R.2
-
8
-
-
79953138434
-
Access control for databases: Concepts and systems
-
E. Bertino, G. Ghinita, A. Kamra, Access Control for Databases: Concepts and Systems, Foundations and Trends in Databases 3(1-2):1-148, 2011.
-
(2011)
Foundations and Trends in Databases
, vol.3
, Issue.1-2
, pp. 1-148
-
-
Bertino, E.1
Ghinita, G.2
Kamra, A.3
-
10
-
-
84948655533
-
Privacy preserving policy-based content sharing in public clouds
-
September
-
M. Nabeel, E. Bertino, Privacy Preserving Policy-Based Content Sharing in Public Clouds, IEEE Transactions on Knowledge and Data Engineering 26(9):2268-2280, September 2014.
-
(2014)
IEEE Transactions on Knowledge and Data Engineering
, vol.26
, Issue.9
, pp. 2268-2280
-
-
Nabeel, M.1
Bertino, E.2
-
11
-
-
77955086804
-
Exam: A comprehensive environment for the analysis of access control policies
-
August
-
D. Lin, P. Rao, E. Bertino, N. Li, J. Lobo, EXAM: A Comprehensive Environment for the Analysis of Access Control Policies" International Journal of Information Security (IJIS) 9(4):253-273, August 2010.
-
(2010)
International Journal of Information Security (IJIS)
, vol.9
, Issue.4
, pp. 253-273
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
12
-
-
77955210831
-
Privacy-Aware role-based access control
-
Article 24, July
-
Q. Ni, E. Bertino, J. Lobo, C. Brodie, C.M. Karat, J. Karat, A. Trombetta, Privacy-Aware Role-Based Access Control, ACM Transactions on Information and System Security 13(3): Article 24, July 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.3
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Brodie, C.4
Karat, C.M.5
Karat, J.6
Trombetta, A.7
-
13
-
-
70450284416
-
Automating role-based provisioning by learning from examples
-
Q. Ni, J. Lobo, S. B. Calo, P. Rohatgi, E. Bertino, Automating Role-Based Provisioning by Learning from Examples, Proceedings of SACMAT 2009.
-
(2009)
Proceedings of SACMAT
-
-
Ni, Q.1
Lobo, J.2
Calo, S.B.3
Rohatgi, P.4
Bertino, E.5
-
14
-
-
33748031419
-
Views and security in distributed database management systems
-
E. Bertino, L.M. Haas, Views and Security in Distributed Database Management Systems, Proceedings of EDBT 1988.
-
(1988)
Proceedings of EDBT
-
-
Bertino, E.1
Haas, L.M.2
-
16
-
-
84926679356
-
Data trustworthiness-Approaches and research challenges
-
E. Bertino, Data Trustworthiness-Approaches and Research Challenges, Proceedings of DPM 2014, SETOP 2014, and QASA 2014, Revised Selected Papers, LNCS 8872, 2015.
-
(2015)
Proceedings of DPM 2014 SETOP 2014, and QASA 2014, Revised Selected Papers, LNCS
, vol.8872
-
-
Bertino, E.1
-
21
-
-
84921417375
-
Secure data aggregation for wireless sensor networks
-
January-February
-
M. Rezvani, A. Ignjatovic, E. Bertino, S. Jha, Secure Data Aggregation for Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing 21(1):98-110, January-February 2015.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
, vol.21
, Issue.1
, pp. 98-110
-
-
Rezvani, M.1
Ignjatovic, A.2
Bertino, E.3
Jha, S.4
-
22
-
-
80052415325
-
Provenance-based trustworthiness assessment in sensor networks
-
H.S. Lim, Y.S. Moon, E. Bertino, Provenance-Based Trustworthiness Assessment in Sensor Networks, Proceedings of DSM 2010.
-
(2010)
Proceedings of DSM
-
-
Lim, H.S.1
Moon, Y.S.2
Bertino, E.3
-
24
-
-
84897743314
-
Secure provenance transmission for streaming data
-
Augst
-
S. Sultana, M. Shehab, E. Bertino, Secure Provenance Transmission for Streaming Data, IEEE Transactions on Knowledge and Data Engineering 25(8):1890-1903, Augst 2013.
-
(2013)
IEEE Transactions on Knowledge and Data Engineering
, vol.25
, Issue.8
, pp. 1890-1903
-
-
Sultana, S.1
Shehab, M.2
Bertino, E.3
-
25
-
-
84926668234
-
Dictionary based secure provenance compression for wireless sensor networks
-
in press
-
C. Wang, S.R. Hussein, S.R., E. Bertino, Dictionary Based Secure Provenance Compression for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, in press, 2015.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
-
-
Wang, C.1
Hussein, S.R.S.R.2
Bertino, E.3
-
27
-
-
34547332566
-
A roadmap for comprehensive online privacy management
-
July
-
A. Anton, E. Bertino, N. Li, T. Yu, A Roadmap for Comprehensive Online Privacy Management, Communications of ACM 50(7):109-116, July 2007.
-
(2007)
Communications of ACM
, vol.50
, Issue.7
, pp. 109-116
-
-
Anton, A.1
Bertino, E.2
Li, N.3
Yu, T.4
-
28
-
-
84943177143
-
-
Springer Briefs in Computer Science, Springer
-
X. Yi, R. Paulet, E. Bertino, Homomorphic Encryption and Applications, Springer Briefs in Computer Science, Springer, 2014.
-
(2014)
Homomorphic Encryption and Applications
-
-
Yi, X.1
Paulet, R.2
Bertino, E.3
-
30
-
-
84901007797
-
Privacy-preserving and content-protecting location based queries
-
R. Paulet, Md. G. Kaosar, X. Yi, E. Bertino, Privacy-Preserving and Content-Protecting Location Based Queries, IEEE Transactions on Knowledge and Data Engineering 26(5): 1200-1210, 2014.
-
(2014)
IEEE Transactions on Knowledge and Data Engineering
, vol.26
, Issue.5
, pp. 1200-1210
-
-
Paulet, R.1
Kaosar, M.G.2
Yi, X.3
Bertino, E.4
-
31
-
-
78650599919
-
The probe framework for the personalized cloaking of private locations
-
M. L. Damiani, E. Bertino, C. Silvestri, The PROBE Framework for the Personalized Cloaking of Private Locations, Transactions on Data Privacy 3(2): 123-148, 2010.
-
(2010)
Transactions on Data Privacy
, vol.3
, Issue.2
, pp. 123-148
-
-
Damiani, M.L.1
Bertino, E.2
Silvestri, C.3
-
32
-
-
84899651651
-
Identidroid: Android can finally wear its anonymous suit
-
B. Shebaro, O. Oluwatimi, D. Midi, E. Bertino, IdentiDroid: Android can finally Wear its Anonymous Suit, Transactions on Data Privacy 7(1): 27-50, 2014.
-
(2014)
Transactions on Data Privacy
, vol.7
, Issue.1
, pp. 27-50
-
-
Shebaro, B.1
Oluwatimi, O.2
Midi, D.3
Bertino, E.4
-
36
-
-
84940883203
-
A hybrid private record linkage scheme: Separating differentially private synopses from matching Records
-
J. Cao, F.Y. Rao, E. Bertino, M. Kantarcioglu, A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses From Matching Records, Proceedings of ICDE 2015.
-
(2015)
Proceedings of ICDE
-
-
Cao, J.1
Rao, F.Y.2
Bertino, E.3
Kantarcioglu, M.4
-
39
-
-
84891281961
-
Data protection from insider threats
-
E. Bertino, Data Protection from Insider Threats. Morgan&Claypool, 2012.
-
(2012)
Morgan&Claypool
-
-
Bertino, E.1
|