Elisa Bertino
Elisa Bertino
Professor of Computer Science, Director of Cyber Center, Purdue University
Verified email at cs.purdue.edu - Homepage
TitleCited byYear
TRBAC: A temporal role-based access control model
E Bertino, PA Bonatti, E Ferrari
ACM Transactions on Information and System Security (TISSEC) 4 (3), 191-233, 2001
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
The specification and enforcement of authorization constraints in workflow management systems
E Bertino, E Ferrari, V Atluri
ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999
A generalized temporal role-based access control model
JBD Joshi, E Bertino, U Latif, A Ghafoor
IEEE Transactions on Knowledge and Data Engineering 17 (1), 4-23, 2005
Geothermal power generation in the world 2005–2010 update report
R Bertani
geothermics 41, 1-29, 2012
Association rule hiding
VS Verykios, AK Elmagarmid, E Bertino, Y Saygin, E Dasseni
IEEE Transactions on Knowledge & Data Engineering, 434-447, 2004
GEO-RBAC: a spatially aware RBAC
ML Damiani, E Bertino, B Catania, P Perlasca
ACM Transactions on Information and System Security (TISSEC) 10 (1), 2, 2007
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEXá…, 1999
Database security-concepts, approaches, and challenges
E Bertino, R Sandhu
IEEE Transactions on Dependable and secure computing, 2-19, 2005
A model of authorization for next-generation database systems
F Rabitti, E Bertino, W Kim, D Woelk
ACM Transactions on Database Systems (TODS) 16 (1), 88-131, 1991
Secure and selective dissemination of XML documents
E Bertino, E Ferrari
ACM Transactions on Information and System Security (TISSEC) 5 (3), 290-331, 2002
Composite objects revisited
W Kim, E Bertino, JF Garza
ACM Sigmod Record 18 (2), 337-347, 1989
A unified framework for enforcing multiple access control policies
S Jajodia, P Samarati, VS Subrahmanian, E Bertino
ACM Sigmod Record 26 (2), 474-485, 1997
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 24, 2010
Indexing techniques for queries on nested objects
E Bertino, W Kim
IEEE Transactions on knowledge and data engineering 1 (2), 196-214, 1989
Hiding association rules by using confidence and support
E Dasseni, VS Verykios, AK Elmagarmid, E Bertino
International Workshop on Information Hiding, 369-383, 2001
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models andá…, 2005
Efficient k-anonymization using clustering techniques
JW Byun, A Kamra, E Bertino, N Li
International Conference on Database Systems for Advanced Applications, 188-200, 2007
Object-oriented database systems: concepts and architectures
E Bertino, L Martino
Addison-Wesley Longman Publishing Co., Inc., 1993
Preserving user location privacy in mobile data management infrastructures
R Cheng, Y Zhang, E Bertino, S Prabhakar
International Workshop on Privacy Enhancing Technologies, 393-412, 2006
The system can't perform the operation now. Try again later.
Articles 1–20