Follow
Elisa Bertino
Elisa Bertino
Professor of Computer Science, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
TRBAC: A temporal role-based access control model
E Bertino, PA Bonatti, E Ferrari
Proceedings of the fifth ACM workshop on Role-based access control, 21-30, 2000
13692000
State-of-the-art in privacy preserving data mining
VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis
ACM Sigmod Record 33 (1), 50-57, 2004
12302004
A generalized temporal role-based access control model
JBD Joshi, E Bertino, U Latif, A Ghafoor
IEEE transactions on knowledge and data engineering 17 (1), 4-23, 2005
8362005
Botnets and internet of things security
E Bertino, N Islam
Computer 50 (2), 76-79, 2017
8302017
The specification and enforcement of authorization constraints in workflow management systems
E Bertino, E Ferrari, V Atluri
ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999
8251999
Association rule hiding
VS Verykios, AK Elmagarmid, E Bertino, Y Saygin, E Dasseni
IEEE Transactions on knowledge and data engineering 16 (4), 434-447, 2004
7372004
Database security-concepts, approaches, and challenges
E Bertino, R Sandhu
IEEE Transactions on Dependable and secure computing 2 (1), 2-19, 2005
7282005
GEO-RBAC: a spatially aware RBAC
ML Damiani, E Bertino, B Catania, P Perlasca
ACM Transactions on Information and System Security (TISSEC) 10 (1), 2-es, 2007
7122007
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
6822005
Disclosure limitation of sensitive rules
M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios
Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX …, 1999
6461999
Quality control in crowdsourcing systems: Issues and directions
M Allahbakhsh, B Benatallah, A Ignjatovic, HR Motahari-Nezhad, ...
IEEE Internet Computing 17 (2), 76-81, 2013
5832013
Efficient k-Anonymization Using Clustering Techniques
JW Byun, A Kamra, E Bertino, N Li
International conference on database systems for advanced applications, 188-200, 2007
5302007
Challenges and opportunities with Big Data 2011-1
D Agrawal, P Bernstein, E Bertino, S Davidson, U Dayal, M Franklin, ...
523*2011
A model of authorization for next-generation database systems
F Rabitti, E Bertino, W Kim, D Woelk
ACM Transactions on Database Systems (TODS) 16 (1), 88-131, 1991
5131991
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
5062010
Secure and selective dissemination of XML documents
E Bertino, E Ferrari
ACM Transactions on Information and System Security (TISSEC) 5 (3), 290-331, 2002
4692002
Composite objects revisited
W Kim, E Bertino, JF Garza
Proceedings of the 1989 ACM SIGMOD international conference on Management of …, 1989
4451989
Hiding association rules by using confidence and support
E Dasseni, VS Verykios, AK Elmagarmid, E Bertino
Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001
4442001
Preserving user location privacy in mobile data management infrastructures
R Cheng, Y Zhang, E Bertino, S Prabhakar
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
4432006
Homomorphic encryption
X Yi, R Paulet, E Bertino, X Yi, R Paulet, E Bertino
Homomorphic encryption and applications, 27-46, 2014
4422014
The system can't perform the operation now. Try again later.
Articles 1–20