Search the dblp DataBase
Elisa Bertino :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Elisa Bertino , Won Kim Indexing Techniques for Queries on Nested Objects. [Citation Graph (51, 14)][DBLP ] IEEE Trans. Knowl. Data Eng., 1989, v:1, n:2, pp:196-214 [Journal ] Won Kim , Elisa Bertino , Jorge F. Garza Composite Objects Revisted. [Citation Graph (43, 13)][DBLP ] SIGMOD Conference, 1989, pp:337-347 [Conf ] Elisa Bertino A View Mechanism for Object-Oriented Databases. [Citation Graph (29, 10)][DBLP ] EDBT, 1992, pp:136-151 [Conf ] Fausto Rabitti , Elisa Bertino , Won Kim , Darrell Woelk A Model of Authorization for Next-Generation Database Systems. [Citation Graph (20, 10)][DBLP ] ACM Trans. Database Syst., 1991, v:16, n:1, pp:88-131 [Journal ] Elisa Bertino , Mauro Negri , Giuseppe Pelagatti , Licia Sbattella Object-Oriented Query Languages: The Notion and the Issues. [Citation Graph (16, 59)][DBLP ] IEEE Trans. Knowl. Data Eng., 1992, v:4, n:3, pp:223-237 [Journal ] Elisa Bertino An Indexing Technique for Object-Oriented Databases. [Citation Graph (13, 3)][DBLP ] ICDE, 1991, pp:160-170 [Conf ] Elisa Bertino , Fausto Rabitti , Simon J. Gibbs Query Processing in a Multimedia Document System. [Citation Graph (12, 0)][DBLP ] ACM Trans. Inf. Syst., 1988, v:6, n:1, pp:1-41 [Journal ] Elisa Bertino , Lorenzo Martino Object-Oriented Database Management Systems: Concepts and Issues. [Citation Graph (10, 0)][DBLP ] IEEE Computer, 1991, v:24, n:4, pp:33-47 [Journal ] Stavros Christodoulakis , J. Vanderbroek , J. Li , T. Li , S. Wan , Y. Wang , M. Papa , Elisa Bertino Development of a Multimedia Information System for an Office Environment. [Citation Graph (9, 14)][DBLP ] VLDB, 1984, pp:261-271 [Conf ] Elisa Bertino Optimization of Queries using Nested Indices. [Citation Graph (7, 5)][DBLP ] EDBT, 1990, pp:44-59 [Conf ] Elisa Bertino Integration of Heterogeneous Data Repositories by Using Object-Oriented Views. [Citation Graph (7, 0)][DBLP ] RIDE-IMS, 1991, pp:22-29 [Conf ] Laura M. Haas , Patricia G. Selinger , Elisa Bertino , Dean Daniels , Bruce G. Lindsay , Guy M. Lohman , Yoshifumi Masunaga , C. Mohan , Pui Ng , Paul F. Wilms , Robert A. Yost R*: A Research Project on Distributed Relational DBMS. [Citation Graph (7, 0)][DBLP ] IEEE Database Eng. Bull., 1982, v:5, n:4, pp:28-32 [Journal ] Elisa Bertino , Paola Foscoli Index Organizations for Object-Oriented Database Systems. [Citation Graph (7, 20)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:2, pp:193-209 [Journal ] Elisa Bertino , Mauro Negri , Giuseppe Pelagatti , Licia Sbattella Integration of heterogeneous database applications through an object-oriented interface. [Citation Graph (6, 0)][DBLP ] Inf. Syst., 1989, v:14, n:5, pp:407-420 [Journal ] Elisa Bertino , Laura M. Haas Views and Security in Distributed Database Management Systems. [Citation Graph (5, 18)][DBLP ] EDBT, 1988, pp:155-169 [Conf ] Elisa Bertino , Danilo Montesi Towards a Logical-Object Oriented Programming Language for Databases. [Citation Graph (5, 14)][DBLP ] EDBT, 1992, pp:168-183 [Conf ] Elisa Bertino Index Configuration in Object-Oriented Databases [Citation Graph (5, 29)][DBLP ] VLDB J., 1994, v:3, n:3, pp:355-399 [Journal ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini A Formal Temporal Object-Oriented Data Model. [Citation Graph (4, 8)][DBLP ] EDBT, 1996, pp:342-356 [Conf ] Elisa Bertino , Paola Foscoli An Analytical Model of Object-Oriented Query Costs. [Citation Graph (4, 0)][DBLP ] POS, 1992, pp:241-261 [Conf ] Alberto Belussi , Elisa Bertino , Barbara Catania Manipulating Spatial Data in Constraint Databases. [Citation Graph (4, 0)][DBLP ] SSD, 1997, pp:115-141 [Conf ] Elisa Bertino , Laura M. Haas , Bruce G. Lindsay View Management in Distributed Data Base Systems. [Citation Graph (4, 4)][DBLP ] VLDB, 1983, pp:376-378 [Conf ] Elisa Bertino , Barbara Catania , Boris Shidlovsky Towards Optimal Two-Dimensional Indexing for Constraint Databases. [Citation Graph (4, 0)][DBLP ] Inf. Process. Lett., 1997, v:64, n:1, pp:1-8 [Journal ] Elisa Bertino , Paola Foscoli On Modeling Cost Functions for Object-Oriented Databases. [Citation Graph (4, 24)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:3, pp:500-508 [Journal ] Elisa Bertino Data Hiding and Security in Object-Oriented Databases. [Citation Graph (3, 6)][DBLP ] ICDE, 1992, pp:338-347 [Conf ] Sunil Choenni , Elisa Bertino , Henk M. Blanken , Thiel Chang On the Selection of Optimal Index Configuration in OO Databases. [Citation Graph (3, 9)][DBLP ] ICDE, 1994, pp:526-537 [Conf ] Boris Shidlovsky , Elisa Bertino A Graph-Theoretic Approach to Indexing in Object-Oriented Databases. [Citation Graph (3, 11)][DBLP ] ICDE, 1996, pp:230-237 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Elisa Bertino , Sushil Jajodia Semantic Assumptions and Query Evaluation in Temporal Databases. [Citation Graph (3, 13)][DBLP ] SIGMOD Conference, 1995, pp:257-268 [Conf ] Sushil Jajodia , Pierangela Samarati , V. S. Subrahmanian , Elisa Bertino A Unified Framework for Enforcing Multiple Access Control Policies. [Citation Graph (3, 12)][DBLP ] SIGMOD Conference, 1997, pp:474-485 [Conf ] Elisa Bertino , C. Guglielmina Path-Index: An Approach to the Efficient Execution of Object-Oriented Queries. [Citation Graph (3, 0)][DBLP ] Data Knowl. Eng., 1993, v:10, n:, pp:1-27 [Journal ] Costantino Thanos , Elisa Bertino , Carlo Carlesi The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System. [Citation Graph (3, 0)][DBLP ] Perform. Eval., 1988, v:8, n:2, pp:129-157 [Journal ] Elisa Bertino , Claudio Bettini , Elena Ferrari , Pierangela Samarati A Temporal Access Control Mechanism for Database Systems. [Citation Graph (3, 10)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:67-80 [Journal ] Pierangela Samarati , Elisa Bertino , Sushil Jajodia An Authorization Model for a Distributed Hypertext System. [Citation Graph (3, 13)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:4, pp:555-562 [Journal ] Elisa Bertino , Pierangela Samarati , Sushil Jajodia Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf ] Elisa Bertino , Claudio Bettini , Pierangela Samarati A Temporal Authorization Model. [Citation Graph (2, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:126-135 [Conf ] Elisa Bertino , Giovanna Guerrini Objects with Multiple Most Specific Classes. [Citation Graph (2, 0)][DBLP ] ECOOP, 1995, pp:102-126 [Conf ] Elisa Bertino , Maurizio Martelli , Danilo Montesi Modelling Database Updates with Constraint Logic Programming. [Citation Graph (2, 0)][DBLP ] FMLDO, 1992, pp:121-132 [Conf ] Elisa Bertino , R. Gagliardi , Mauro Negri , Giuseppe Pelagatti , Licia Sbattella The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications. [Citation Graph (2, 0)][DBLP ] OODBS, 1988, pp:213-218 [Conf ] Elisa Bertino , Barbara Catania , Giovanna Guerrini , Danilo Montesi Transaction Optimization in Rule Databases. [Citation Graph (2, 0)][DBLP ] RIDE-ADS, 1994, pp:137-145 [Conf ] Elisa Bertino , C. Guglielmina Optimization of Object-Oriented Queries Using Path Indices. [Citation Graph (2, 0)][DBLP ] RIDE-TQP, 1992, pp:140-149 [Conf ] Elisa Bertino , Giovanna Guerrini , Danilo Montesi Towards Deductice Object Databases. [Citation Graph (2, 0)][DBLP ] TAPOS, 1995, v:1, n:1, pp:19-39 [Journal ] Elisa Bertino , Elena Ferrari Temporal Synchronization Models for Multimedia Data. [Citation Graph (2, 36)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:4, pp:612-631 [Journal ] Elisa Bertino , Maria Damiani , Paolo Randi An Approach to Integrate Multimedi Data in a Knowledge Representation System. [Citation Graph (1, 0)][DBLP ] Advanced Visual Interfaces, 1992, pp:109-123 [Conf ] Indrajit Ray , Elisa Bertino , Sushil Jajodia , Luigi V. Mancini An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf ] Barbara Catania , Alberto Belussi , Elisa Bertino Introducing External Functions in Constraint Query Languages. [Citation Graph (1, 0)][DBLP ] CP, 1998, pp:132-146 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:259-274 [Conf ] Elisa Bertino , Fabio Origgi , Pierangela Samarati A new Authorization Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:199-222 [Conf ] Elisa Bertino , Barbara Catania , Giovanna Guerrini , Danilo Montesi Static Analysis of Transactional Intensional Databases. [Citation Graph (1, 0)][DBLP ] Workshop on Deductive Databases and Logic Programming, 1994, pp:57-73 [Conf ] Elisa Bertino , Maurizio Martelli , Danilo Montesi Modeling Database Updates with Constraint Logic Programming. [Citation Graph (1, 0)][DBLP ] Workshop on Deductive Databases, JICSLP, 1992, pp:175-184 [Conf ] Elisa Bertino , Sushil Jajodia Modeling Multilevel Entities Using Single Level Objects. [Citation Graph (1, 0)][DBLP ] DOOD, 1993, pp:415-428 [Conf ] Costantino Thanos , Carlo Carlesi , Elisa Bertino Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System. [Citation Graph (1, 0)][DBLP ] ECI, 1981, pp:266-279 [Conf ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini , Isabella Merlo Extending the ODMG Object Model with Time. [Citation Graph (1, 0)][DBLP ] ECOOP, 1998, pp:41-66 [Conf ] Elisa Bertino , Giovanna Guerrini , Danilo Montesi Deductive Object Databases. [Citation Graph (1, 0)][DBLP ] ECOOP, 1994, pp:213-235 [Conf ] Elisa Bertino Distributed Database Design Using the Entity-Relationship Model. [Citation Graph (1, 14)][DBLP ] ER, 1983, pp:189-203 [Conf ] Elisa Bertino , Sandro Bottarelli , Maria Damiani , M. Marcadella , M. Migliorati , Paolo Randi The ADKMS Knowledge Acquisition System. [Citation Graph (1, 0)][DBLP ] Future Databases, 1992, pp:298-314 [Conf ] Elisa Bertino , Carlo Meghini , Costantino Thanos The Update Problem in the Distributed Database System Hermes/1. [Citation Graph (1, 0)][DBLP ] ICOD, 1983, pp:317-331 [Conf ] Elisa Bertino , Barbara Catania Static Analysis of Intensional Databases in U-Datalog. [Citation Graph (1, 15)][DBLP ] PODS, 1996, pp:202-212 [Conf ] Elisa Bertino , A. Quarati An Approach to Support Method Invocations in Object-Oriented Queries. [Citation Graph (1, 0)][DBLP ] RIDE-TQP, 1992, pp:163-168 [Conf ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini An Approach to Model and Query Event-Based Temporal Data. [Citation Graph (1, 0)][DBLP ] TIME, 1998, pp:122-131 [Conf ] Elena Ferrari , Elisa Bertino , Claudio Bettini , Alberto Motta , Pierangela Samarati On Using Materialization Strategies for a Temporal Authorization Model. [Citation Graph (1, 0)][DBLP ] VIEWS, 1996, pp:34-42 [Conf ] Elisa Bertino , Claudio Bettini , Elena Ferrari , Pierangela Samarati Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. [Citation Graph (1, 6)][DBLP ] VLDB, 1996, pp:472-483 [Conf ] Elisa Bertino , Daniela Musto Query optimization by using knowledge about data semantics. [Citation Graph (1, 0)][DBLP ] Data Knowl. Eng., 1992, v:9, n:, pp:121-155 [Journal ] Elisa Bertino , Amani A. Saad , Mohamed A. Ismail Clustering Techniques in Object Bases: A Survey. [Citation Graph (1, 0)][DBLP ] Data Knowl. Eng., 1994, v:12, n:3, pp:255-275 [Journal ] Elisa Bertino , Claudio Bettini , Elena Ferrari , Pierangela Samarati Decentralized Administration for a Temporal Access Control Model. [Citation Graph (1, 0)][DBLP ] Inf. Syst., 1997, v:22, n:4, pp:223-248 [Journal ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Database Security: Research and Practice [Citation Graph (1, 0)][DBLP ] Inf. Syst., 1995, v:20, n:7, pp:537-556 [Journal ] Giovanna Guerrini , Elisa Bertino , René Bal A Formal Definition of the Chimera Object-Oriented Data Model. [Citation Graph (1, 0)][DBLP ] J. Intell. Inf. Syst., 1998, v:11, n:1, pp:5-40 [Journal ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Access Control in Object-Oriented Database Systems - Some Approaches and Issues. [Citation Graph (1, 0)][DBLP ] , 1993, v:, n:, pp:17-44 [Journal ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini T_Chimera: A Temporal Object-Oriented Data Model. [Citation Graph (1, 0)][DBLP ] TAPOS, 1997, v:3, n:2, pp:103-125 [Journal ] Vijayalakshmi Atluri , Sushil Jajodia , Elisa Bertino Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. [Citation Graph (1, 9)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:5, pp:839-854 [Journal ] Elisa Bertino , Elena Ferrari , Marco Stolf MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:102-125 [Journal ] Elisa Bertino , Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal ] Elisa Bertino , Pierangela Samarati , Sushil Jajodia An Extended Authorization Model for Relational Databases. [Citation Graph (1, 16)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:85-101 [Journal ] Elisa Bertino , Claudio Bettini , Elena Ferrari , Pierangela Samarati An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. [Citation Graph (1, 18)][DBLP ] ACM Trans. Database Syst., 1998, v:23, n:3, pp:231-285 [Journal ] Elisa Bertino , Anna Cinzia Squicciarini , D. Mevi A Fine-Grained Access Control Model for Web Services. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2004, pp:33-40 [Conf ] Pietro Mazzoleni , Bruno Crispo , Swaminathan Sivasubramanian , Elisa Bertino Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:77-86 [Conf ] Elisa Bertino , Lorenzo Martino Security in SOA and Web Services. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2006, pp:- [Conf ] Elisa Bertino , Ashish Kamra , Evimaria Terzi , Athena Vakali Intrusion Detection in RBAC-administered Databases. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:170-182 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Specifying and computing hierarchies of temporal authorizations. [Citation Graph (0, 0)][DBLP ] APPIA-GULP-PRODE, 1999, pp:243-258 [Conf ] Elisa Bertino , Barbara Catania , Giovanna Guerrini , Maurizio Martelli , Danilo Montesi Formalizzazione e Ottimizzazione di Transazioni di modifica in CLP(AD). [Citation Graph (0, 0)][DBLP ] GULP, 1993, pp:501-518 [Conf ] Elisa Bertino , Barbara Catania , Giovanna Guerrini , Maurizio Martelli , Danilo Montesi A Bottom-Up Interpreter for a Database Language with Updates and Transactions. [Citation Graph (0, 0)][DBLP ] GULP-PRODE (2), 1994, pp:206-220 [Conf ] Elisa Bertino , Alessandra Mileo , Alessandro Provetti User Preferences VS Minimality in PPDL. [Citation Graph (0, 0)][DBLP ] APPIA-GULP-PRODE, 2003, pp:110-122 [Conf ] Elisa Bertino , Alessandro Provetti , Franco Salvetti Local Closed-World Assumptions for reasoning about Semantic Web data. [Citation Graph (0, 0)][DBLP ] APPIA-GULP-PRODE, 2003, pp:314-323 [Conf ] Elisa Bertino , Giovanni Chiola , Luigi V. Mancini Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. [Citation Graph (0, 0)][DBLP ] ICATPN, 1998, pp:266-285 [Conf ] Stefano Valtolina , Pietro Mazzoleni , Stefano Franzoni , Elisa Bertino A semantic approach to build personalized interfaces in the cultural heritage domain. [Citation Graph (0, 0)][DBLP ] AVI, 2006, pp:306-309 [Conf ] Elisa Bertino Purpose based access control for privacy protection. [Citation Graph (0, 0)][DBLP ] BDA, 2004, pp:243- [Conf ] Elisa Bertino , Dolores Cuadra , Paloma Martínez An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data. [Citation Graph (0, 0)][DBLP ] CAiSE, 2005, pp:119-134 [Conf ] Elisa Bertino , Pierangela Samarati , Sushil Jajodia High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf ] Elisa Bertino , Barbara Carminati , Elena Ferrari A temporal key management scheme for secure broadcasting of XML documents. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:31-40 [Conf ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf ] Mohamed Shehab , Elisa Bertino , Arif Ghafoor Secure collaboration in mediator-free environments. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:58-67 [Conf ] Alberto Belussi , Elisa Bertino , Michela Bertolotto , Barbara Catania Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases. [Citation Graph (0, 0)][DBLP ] CDB, 1995, pp:40-67 [Conf ] Elisa Bertino , Barbara Catania , Stéphane Bressan Integrity Constraint Checking in Chimera. [Citation Graph (0, 0)][DBLP ] CDB, 1997, pp:160-186 [Conf ] Barbara Carminati , Elena Ferrari , Elisa Bertino Securing XML data in third-party distribution systems. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:99-106 [Conf ] Elisa Bertino , Moustafa A. Hammad , Walid G. Aref , Ahmed K. Elmagarmid An Access Control Model for Video Database Systems. [Citation Graph (0, 0)][DBLP ] CIKM, 2000, pp:336-343 [Conf ] Elisa Bertino , S. Salerno , Boris Shidlovsky Enhanced Nested-Inherited Index for OODBMS. [Citation Graph (0, 5)][DBLP ] CIKM, 1995, pp:58-65 [Conf ] Jianping Fan , Hangzai Luo , Mohand-Said Hacid , Elisa Bertino A novel approach for privacy-preserving video sharing. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:609-616 [Conf ] Danilo Montesi , Elisa Bertino Queries, Constraints, Updates and Transactions Within a Logic-Based Language. [Citation Graph (0, 0)][DBLP ] CIKM, 1993, pp:500-506 [Conf ] Elisa Bertino , Elena Ferrari , Anna Cinzia Squicciarini Trust-Chi: An XML Framework for Trust Negotiations. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:146-157 [Conf ] Elisa Bertino , Maurizio Martelli , Danilo Montesi CLP (X) as a framework for action and deduction. [Citation Graph (0, 0)][DBLP ] CNKBS, 1992, pp:27-29 [Conf ] Elisa Bertino Protecting XML Documents: Position Paper. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:132-0 [Conf ] Elisa Bertino Protecting Information in the Web - Position Paper. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1999, pp:50-0 [Conf ] Elisa Bertino , Elena Ferrari Data Security. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1998, pp:228-239 [Conf ] Elisa Bertino , Elena Ferrari , Andrea Perego Ma X : An Access Control System for Digital Libraries and the Web. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:945-950 [Conf ] James Joshi , Elisa Bertino , Arif Ghafoor Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:951-956 [Conf ] Elisa Bertino , Dennis McLeod PC Co-chairs' Message. [Citation Graph (0, 0)][DBLP ] CoopIS/DOA/ODBASE, 2003, pp:2-3 [Conf ] Elisa Bertino , Anna Cinzia Squicciarini A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. [Citation Graph (0, 0)][DBLP ] CSCWD, 2006, pp:14- [Conf ] Elisa Bertino , Elena Ferrari , Francesco Buccafurri , Pasquale Rullo A Logical Framework for Reasoning on Data Access Control Policies. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:175-189 [Conf ] Elisa Bertino , Barbara Catania , Vincenzo Gervasi , Alessandra Raffaetà Active-U-Datalog: Integrating Active Rules in a Logical Update Language. [Citation Graph (0, 0)][DBLP ] Transactions and Change in Logic Databases, 1998, pp:107-133 [Conf ] Elisa Bertino Purpose Based Access Control for Privacy Protection in Database Systems. [Citation Graph (0, 0)][DBLP ] DASFAA, 2005, pp:2- [Conf ] Elisa Bertino , Barbara Catania , Boris Chidlovskii Approximation Techniques for Indexing Two-Dimensional Constraint Databases. [Citation Graph (0, 12)][DBLP ] DASFAA, 1999, pp:213-220 [Conf ] Elisa Bertino , Barbara Catania , Paolo Perlasca Introducing Cooperation and Actions in Amalgamated Knowledge Bases. [Citation Graph (0, 0)][DBLP ] DASFAA, 2001, pp:108-115 [Conf ] Elisa Bertino , Igor Nai Fovino Information Driven Evaluation of Data Hiding Algorithms. [Citation Graph (0, 0)][DBLP ] DaWaK, 2005, pp:418-427 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Elena Ferrari , Pietro Mazzoleni Supporting Delegation in Secure Workflow Management Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:190-202 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:135-158 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:231-247 [Conf ] Vijayalakshmi Atluri , Wei-kuang Huang , Elisa Bertino An Execution Model for Multilevel Seccure Workflows. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:151-165 [Conf ] Elisa Bertino , M. Braun , Silvana Castano , Elena Ferrari , Marco Mesiti Author-X: A Java-Based System for XML Data Protection. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:15-26 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Specifying and Computing Hierarchies of Temporal Authorizations. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:285-300 [Conf ] Elisa Bertino , Elena Ferrari A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:95-109 [Conf ] Elisa Bertino , Elena Ferrari Administration Policies in a Multipolicy Autorization System. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:341-355 [Conf ] Elisa Bertino , Elena Ferrari , Giovanni Mella Distributed Cooperative Updates of XML Documents. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:147-159 [Conf ] Elisa Bertino , Elena Ferrari , Anna Cinzia Squicciarini A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:176-189 [Conf ] Roshan K. Thomas , Elisa Bertino , Pierangela Samarati , Hans Hermann Brüggemann , Bret Hartman , Ravi S. Sandhu , T. C. Ting Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:289-298 [Conf ] Elisa Bertino , Bruno Crispo , Pietro Mazzoleni Supporting Multi-Dimensional Trustworthiness for Grid Workflows. [Citation Graph (0, 0)][DBLP ] DELOS Workshop: Digital Library Architectures, 2004, pp:195-204 [Conf ] Elisa Bertino , Danilo Montesi Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation. [Citation Graph (0, 0)][DBLP ] DEXA, 1990, pp:500-507 [Conf ] Elisa Bertino , Elena Ferrari , Andrea Perego , Gian Piero Zarri A Multi-Strategy Approach to Rating and Filtering Online Resources. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2005, pp:519-523 [Conf ] Abhilasha Bhargav-Spantzel , Anna Cinzia Squicciarini , Elisa Bertino Establishing and protecting digital identity in federation systems. [Citation Graph (0, 0)][DBLP ] Digital Identity Management, 2005, pp:11-19 [Conf ] Basit Shafiq , Elisa Bertino , Arif Ghafoor Access control management in a distributed environment supporting dynamic collaboration. [Citation Graph (0, 0)][DBLP ] Digital Identity Management, 2005, pp:104-112 [Conf ] Abhilasha Bhargav-Spantzel , Anna Cinzia Squicciarini , Elisa Bertino Privacy preserving multi-factor authentication with biometrics. [Citation Graph (0, 0)][DBLP ] Digital Identity Management, 2006, pp:63-72 [Conf ] Elisa Bertino , Barbara Carminati , Elena Ferrari , Giovanni Mella Author-Chi - A System for Secure Dissemination and Update of XML Documents. [Citation Graph (0, 0)][DBLP ] DNIS, 2003, pp:66-85 [Conf ] Elisa Bertino , Stefano Franzoni , Pietro Mazzoleni , Stefano Valtolina Integration of Virtual Reality and Database System Techniques. [Citation Graph (0, 0)][DBLP ] DNIS, 2005, pp:92-103 [Conf ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo Trigger Inheritance and Overriding in Active Object Database Systems. [Citation Graph (0, 0)][DBLP ] DOOD, 1997, pp:193-210 [Conf ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo , Marco Mesiti An Approach to Classify Semi-structured Objects. [Citation Graph (0, 0)][DBLP ] ECOOP, 1999, pp:416-440 [Conf ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo Exception Handling in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] Advances in Exception Handling Techniques, 2000, pp:234-250 [Conf ] Elisa Bertino , Barbara Catania , Boris Shidlovsky Towards Optimal Indexing for Segment Databases. [Citation Graph (0, 18)][DBLP ] EDBT, 1998, pp:39-53 [Conf ] Elisa Bertino , Fausto Rabitti , Costantino Thanos MULTOS: a Document Server for Distributed Office Systems. [Citation Graph (0, 3)][DBLP ] EDBT, 1988, pp:606-615 [Conf ] Elisa Bertino , Giovanna Guerrini , Marco Mesiti DiXeminator: A Profile-Based Selective Dissemination System for XML Documents. [Citation Graph (0, 0)][DBLP ] EDBT Workshops, 2004, pp:578-587 [Conf ] Elisa Bertino , Giovanna Guerrini , Marco Mesiti , Luigi Tosetto Evolving a Set of DTDs According to a Dynamic Set of XML Documents. [Citation Graph (0, 0)][DBLP ] EDBT Workshops, 2002, pp:45-66 [Conf ] Elisa Bertino , Maurizio Martelli , Danilo Montesi CLP(AD) as a Deductive Database Language with Updates. [Citation Graph (0, 0)][DBLP ] ELP, 1992, pp:80-99 [Conf ] Stefano Rizzi , Elisa Bertino , Barbara Catania , Matteo Golfarelli , Maria Halkidi , Manolis Terrovitis , Panos Vassiliadis , Michalis Vazirgiannis , Euripides Vrachnos Towards a Logical Model for Patterns. [Citation Graph (0, 0)][DBLP ] ER, 2003, pp:77-90 [Conf ] Elisa Bertino , Elena Ferrari , Andrea Perego An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration. [Citation Graph (0, 0)][DBLP ] ECDL, 2002, pp:656-657 [Conf ] Elisa Bertino , Francesco Buccafurri , Elena Ferrari , Pasquale Rullo An Authorization Model and Its Formal Semantics. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:127-142 [Conf ] Elisa Bertino , Elena Ferrari , Loredana Parasiliti Provenza Signature and Access Control Policies for XML Documents. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:1-22 [Conf ] Alessandro Ciampichetti , Elisa Bertino , Luigi V. Mancini Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:359-373 [Conf ] Elisa Bertino , Giovanna Guerrini , Danilo Montesi Inheritance in a Deductive Object Database Language with Updates. [Citation Graph (0, 0)][DBLP ] FMLDO, 1999, pp:42-64 [Conf ] Elisa Bertino , Giovanna Guerrini , Danilo Montesi Inheritance in a Deductive Object Database Language with Updates. [Citation Graph (0, 0)][DBLP ] FMLDO - Selected Papers, 1999, pp:67-90 [Conf ] Elisa Bertino , Ji-Won Byun , Ninghui Li Privacy-Preserving Database Systems. [Citation Graph (0, 0)][DBLP ] FOSAD, 2005, pp:178-206 [Conf ] Elisa Bertino , Elena Camossi , Giovanna Guerrini Access to Multigranular Temporal Objects. [Citation Graph (0, 0)][DBLP ] FQAS, 2004, pp:320-333 [Conf ] Elisa Bertino , Anna Cinzia Squicciarini A Flexible Access Control Model for Web Services. [Citation Graph (0, 0)][DBLP ] FQAS, 2004, pp:13-16 [Conf ] Elisa Bertino , Pietro Mazzoleni , Bruno Crispo , Swaminathan Sivasubramanian , Elena Ferrari Towards Supporting Fine-Grained Access Control for Grid Resources. [Citation Graph (0, 0)][DBLP ] FTDCS, 2004, pp:59-65 [Conf ] Elisa Bertino , Maria Damiani , Paolo Randi Multimedia Data Handling in a Knowledge Representation System. [Citation Graph (0, 0)][DBLP ] Future Databases, 1992, pp:133-141 [Conf ] Alberto Belussi , Elisa Bertino , Barbara Catania , Maria Luisa Damiani , Andrea Nucita An authorization model for geographical maps. [Citation Graph (0, 0)][DBLP ] GIS, 2004, pp:82-91 [Conf ] Alberto Belussi , Elisa Bertino , Andrea Nucita Grid based methods for estimating spatial join selectivity. [Citation Graph (0, 0)][DBLP ] GIS, 2004, pp:92-100 [Conf ] Alberto Belussi , Barbara Catania , Elisa Bertino A reference framework for integrating multiple representations of geographical maps. [Citation Graph (0, 0)][DBLP ] GIS, 2003, pp:33-40 [Conf ] Elena Camossi , Michela Bertolotto , Elisa Bertino , Giovanna Guerrini A multigranular spatiotemporal data model. [Citation Graph (0, 0)][DBLP ] GIS, 2003, pp:94-101 [Conf ] Elisa Bertino Method precomputation in object-oriented databases. [Citation Graph (0, 0)][DBLP ] COOCS, 1991, pp:199-212 [Conf ] Anna Cinzia Squicciarini , Abhilasha Bhargav-Spantzel , Elisa Bertino , Elena Ferrari , Indrakshi Ray Trust Negotiations with Customizable Anonymity. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:69-72 [Conf ] Yunhua Koglin , Giovanni Mella , Elisa Bertino , Elena Ferrari An Update Protocol for XML Documents in Distributed and Cooperative Systems. [Citation Graph (0, 0)][DBLP ] ICDCS, 2005, pp:314-323 [Conf ] Elisa Bertino , Barbara Catania , Boris Chidlovskii Indexing Constraint Databases by Using a Dual Representation. [Citation Graph (0, 15)][DBLP ] ICDE, 1999, pp:618-627 [Conf ] Elisa Bertino , Barbara Catania , Wen Qiang Wang XJoin Index: Indexing XML Data for Efficient Handling of Branching Path Expressions. [Citation Graph (0, 0)][DBLP ] ICDE, 2004, pp:828- [Conf ] Elisa Bertino , Beng Chin Ooi , Yanjiang Yang , Robert H. Deng Privacy and Ownership Preserving of Outsourced Medical Data. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:521-532 [Conf ] Barbara Carminati , Elena Ferrari , Elisa Bertino Assuring Security Properties in Third-party Architectures. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:547-548 [Conf ] Basit Shafiq , Arjmand Samuel , Elisa Bertino , Arif Ghafoor Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. [Citation Graph (0, 0)][DBLP ] ICDE, 2006, pp:119- [Conf ] Alberto Trombetta , Elisa Bertino Private Updates to Anonymous Databases. [Citation Graph (0, 0)][DBLP ] ICDE, 2006, pp:116- [Conf ] Elisa Bertino , Bill Black , Andrew Brasher , Vito Candela , Barbara Catania , Diana Deavin , Luigi Di Pace , Floriana Esposito , Pietro Leo , John McNaught , Andreas Persidis , Fabio Rinaldi , Giovanni Semeraro , Gian Piero Zarri CONCERTO, Conceptual Indexing, Querying and Retrieval of Digital Documents. [Citation Graph (0, 0)][DBLP ] ICMCS, Vol. 2, 1999, pp:1106-1109 [Conf ] Bruno Crispo , Swaminathan Sivasubramanian , Pietro Mazzoleni , Elisa Bertino P-Hera: Scalable fine-grained access control for P2P infrastructures. [Citation Graph (0, 0)][DBLP ] ICPADS (1), 2005, pp:585-591 [Conf ] Elisa Bertino , Barbara Carminati , Elena Ferrari A Flexible Authentication Method for UDDI Registries. [Citation Graph (0, 0)][DBLP ] ICWS, 2003, pp:218-226 [Conf ] Rafae Bhatti , Elisa Bertino , Arif Ghafoor A Trust-based Context-Aware Access Control Model for Web-Services. [Citation Graph (0, 0)][DBLP ] ICWS, 2004, pp:184-191 [Conf ] Rafae Bhatti , James Joshi , Elisa Bertino , Arif Ghafoor Access Control in Dynamic XML-Based Web-Services with X-RBAC. [Citation Graph (0, 0)][DBLP ] ICWS, 2003, pp:243-249 [Conf ] Elisa Bertino , Jason Crampton , Federica Paci Access Control and Authorization Constraints for WS-BPEL. [Citation Graph (0, 0)][DBLP ] ICWS, 2006, pp:275-284 [Conf ] Elisa Bertino , Danilo Montesi , Maria Bagnato , Peter A. Dearnley Rules Termination Analysis investigating the interaction between transactions and triggers. [Citation Graph (0, 0)][DBLP ] IDEAS, 2002, pp:285-294 [Conf ] Elisa Bertino , Marco Mesiti , Munir Cochinwala A Trigger-Based Approach for Communication Personalization. [Citation Graph (0, 0)][DBLP ] IDEAS, 2004, pp:3-13 [Conf ] Elisa Bertino , Danilo Montesi , Alberto Trombetta Fuzzy and Presentation Algebras for Web and Multimedia Data. [Citation Graph (0, 0)][DBLP ] IDEAS, 2000, pp:134-144 [Conf ] Elisa Bertino , Elena Ferrari , Andrea Perego , Gian Piero Zarri An Integrated Approach to Rating and Filtering Web Content. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2005, pp:749-751 [Conf ] Elisa Bertino , Sandro Bottarelli , Maria Damiani , M. Marcadella , M. Migliorati , Paolo Randi A Knowledge Based Information System. [Citation Graph (0, 0)][DBLP ] IFIP Congress (3), 1992, pp:189-195 [Conf ] Elena Dasseni , Vassilios S. Verykios , Ahmed K. Elmagarmid , Elisa Bertino Hiding Association Rules by Using Confidence and Support. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2001, pp:369-383 [Conf ] B. Armani , Elisa Bertino , Barbara Catania , D. Laradi , B. Marin , Gian Piero Zarri Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries. [Citation Graph (0, 0)][DBLP ] ISMIS, 2000, pp:68-76 [Conf ] Elisa Bertino , Giovanna Guerrini , Marco Mesiti Matching an XML Document against a Set of DTDs. [Citation Graph (0, 0)][DBLP ] ISMIS, 2002, pp:412-422 [Conf ] Elisa Bertino , Alessandra Mileo , Alessandro Provetti PDL with Maximum Consistency Monitors. [Citation Graph (0, 0)][DBLP ] ISMIS, 2003, pp:65-74 [Conf ] Gian Piero Zarri , Elisa Bertino , Bill Black , Andrew Brasher , Barbara Catania , Diana Deavin , Luigi Di Pace , Floriana Esposito , Pietro Leo , John McNaught , Andreas Persidis , Fabio Rinaldi , Giovanni Semeraro CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents. [Citation Graph (0, 0)][DBLP ] ISMIS, 1999, pp:226-234 [Conf ] Elisa Bertino , Barbara Carminati , Elena Ferrari A Secure Publishing Service for Digital Libraries of XML Documents. [Citation Graph (0, 0)][DBLP ] ISC, 2001, pp:347-362 [Conf ] Elisa Bertino , Elena Ferrari , Giovanni Mella An XML-Based Approach to Document Flow Verification. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:207-218 [Conf ] Elisa Bertino , Teodoro Leggieri , Evimaria Terzi Securing DBMS: Characterizing and Detecting Query Floods. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:195-206 [Conf ] Elisa Bertino , Maria Luisa Damiani Spatial Knowledge-Based Applications and Technologies: Research Issues. [Citation Graph (0, 0)][DBLP ] KES (4), 2005, pp:324-328 [Conf ] Maria Luisa Damiani , Elisa Bertino Access Control and Privacy in Location-Aware Services forMobile Organizations. [Citation Graph (0, 0)][DBLP ] MDM, 2006, pp:11- [Conf ] Elisa Bertino , Munir Cochinwala , Marco Mesiti UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System. [Citation Graph (0, 0)][DBLP ] Mobile Data Management, 2002, pp:8-0 [Conf ] Stefano Valtolina , Stefano Franzoni , Pietro Mazzoleni , Elisa Bertino Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study. [Citation Graph (0, 0)][DBLP ] MMM, 2005, pp:214-221 [Conf ] Xiaoxin Wu , Jun Liu , Xiaoyan Hong , Elisa Bertino Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:461-472 [Conf ] Elisa Bertino , Barbara Catania Database Monitoring in U-Datalog. [Citation Graph (0, 0)][DBLP ] NGITS, 1995, pp:0-0 [Conf ] Elisa Bertino , Giovanna Guerrini , Danilo Montesi Generic Methods in Deductive Object Databases. [Citation Graph (0, 0)][DBLP ] OOIS, 1994, pp:210-213 [Conf ] Elisa Bertino , Giovanna Guerrini Extending the ODMG Object Model with Composite Objects. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1998, pp:259-270 [Conf ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:96-116 [Conf ] Elisa Bertino , Pierangela Samarati Research Issues in Discretionary Authorizations for Object Bases. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:183-199 [Conf ] Elisa Bertino , Barbara Catania , Anna Maddalena Towards a Language for Pattern Manipulation and Querying. [Citation Graph (0, 0)][DBLP ] PaRMa, 2004, pp:- [Conf ] Elisa Bertino , Elena Ferrari , Anna Cinzia Squicciarini Privacy-Preserving Trust Negotiations. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2004, pp:283-301 [Conf ] Anna Cinzia Squicciarini , Abhilasha Bhargav-Spantzel , Alexei Czeskis , Elisa Bertino Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:78-98 [Conf ] Reynold Cheng , Yu Zhang , Elisa Bertino , Sunil Prabhakar Preserving User Location Privacy in Mobile Data Management Infrastructures. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:393-412 [Conf ] Indrakshi Ray , Elisa Bertino , Anna Cinzia Squicciarini , Elena Ferrari Anonymity Preserving Techniques in Trust Negotiations. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:93-109 [Conf ] Barbara Catania , Anna Maddalena , Maurizio Mazza , Elisa Bertino , Stefano Rizzi A Framework for Data Mining Pattern Management. [Citation Graph (0, 0)][DBLP ] PKDD, 2004, pp:87-98 [Conf ] Elisa Bertino , Barbara Catania , Eleonora Caglio Applying Data Mining Techniques to Wafer Manufacturing. [Citation Graph (0, 0)][DBLP ] PKDD, 1999, pp:41-50 [Conf ] Elisa Bertino , Barbara Catania , Elena Ferrari , Paolo Perlasca A System to Specify and Manage Multipolicy Access Control Models. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:116-127 [Conf ] Elisa Bertino , Elena Ferrari , Anna Cinzia Squicciarini X-TNL: An XML-based Language for Trust Negotiations. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:81-84 [Conf ] Elisa Bertino , Alessandra Mileo , Alessandro Provetti PDL with Preferences. [Citation Graph (0, 0)][DBLP ] POLICY, 2005, pp:213-222 [Conf ] Babak Sadighi Firozabadi , Marek J. Sergot , Anna Cinzia Squicciarini , Elisa Bertino A Framework for Contractual Resource Sharing in Coalitions. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:117-126 [Conf ] Elisa Bertino , Abhilasha Bhargav-Spantzel , Anna Cinzia Squicciarini Policy Languages for Digital Identity Management in Federation Systems. [Citation Graph (0, 0)][DBLP ] POLICY, 2006, pp:54-66 [Conf ] Guy Lebanon , Monica Scannapieco , Mohamed R. Fouad , Elisa Bertino Beyond k -Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2006, pp:217-232 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari TRBAC: a temporal role-based access control model. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:21-30 [Conf ] Elisa Bertino , Elena Ferrari , Vijayalakshmi Atluri A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:1-12 [Conf ] Elisa Bertino Query Decomposition in an Object-Oriented Database System Distributed on a Local Area Network. [Citation Graph (0, 0)][DBLP ] RIDE-DOM, 1995, pp:2-9 [Conf ] Elisa Bertino , Maria Luisa Damiani , Davide Momini An Access Control System for a Web Map Management Service. [Citation Graph (0, 0)][DBLP ] RIDE, 2004, pp:33-39 [Conf ] Elisa Bertino , Maria Damiani , Paolo Randi , Luca Spampinato An Advanced Information Management System. [Citation Graph (0, 0)][DBLP ] RIDE-IMS, 1993, pp:61-64 [Conf ] Elisa Bertino , Elena Ferrari , Evaggelia Pitoura An Access Control Mechanism for Large Scale Data Dissemination Systems. [Citation Graph (0, 6)][DBLP ] RIDE-DM, 2001, pp:43-50 [Conf ] Maria Luisa Damiani , Elisa Bertino Architectural issues for a location-aware role-based access control system. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1184-1185 [Conf ] Danfeng Yao , Yunhua Koglin , Elisa Bertino , Roberto Tamassia Decentralized authorization and data security in web content delivery. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:1654-1661 [Conf ] Elisa Bertino , Barbara Catania , Maria Luisa Damiani , Paolo Perlasca GEO-RBAC: a spatially aware RBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:29-37 [Conf ] Elisa Bertino , Silvana Castano , Elena Ferrari On specifying security policies for web documents with an XML-based language. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:57-65 [Conf ] Elisa Bertino , Barbara Catania , Elena Ferrari , Paolo Perlasca A logical framework for reasoning about access control models. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:41-52 [Conf ] Elisa Bertino , Bruno Crispo , James Joshi , Wengliang (Kevin) Du , Ravi S. Sandhu Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:125- [Conf ] Elisa Bertino , Trent Jaeger , Jonathan D. Moffett , Sylvia L. Osborn , Ravi Ravi Making access control more usable. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:141- [Conf ] Elisa Bertino , Giovanni Mella , Gianluca Correndo , Elena Ferrari An infrastructure for managing secure update operations on XML data. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:110-122 [Conf ] Rafae Bhatti , James Joshi , Elisa Bertino , Arif Ghafoor X-GTRBAC admin: a decentralized administration model for enterprise wide access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:78-86 [Conf ] Ravi S. Sandhu , Elisa Bertino , Trent Jaeger , D. Richard Kuhn , Carl E. Landwehr Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:53- [Conf ] Ji-Won Byun , Elisa Bertino , Ninghui Li Purpose based access control of complex data for privacy protection. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:102-110 [Conf ] Ji-Won Byun , Yonglak Sohn , Elisa Bertino Systematic control and management of data integrity. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:101-110 [Conf ] Mohamed Shehab , Elisa Bertino , Arif Ghafoor SERAT: SEcure role mApping technique for decentralized secure interoperability. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:159-167 [Conf ] Bhavani M. Thuraisingham , Gal Lavee , Elisa Bertino , Jianping Fan , Latifur Khan Access control, confidentiality and privacy for video surveillance databases. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:1-10 [Conf ] James B. D. Joshi , Elisa Bertino Fine-grained role-based delegation in presence of the hybrid role hierarchy. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:81-90 [Conf ] James Joshi , Elisa Bertino , Arif Ghafoor Temporal hierarchies and inheritance semantics for GTRBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:74-83 [Conf ] James Joshi , Basit Shafiq , Arif Ghafoor , Elisa Bertino Dependencies and separation of duty constraints in GTRBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:51-64 [Conf ] Pietro Mazzoleni , Elisa Bertino , Bruno Crispo XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:219-227 [Conf ] Ji-Won Byun , Yonglak Sohn , Elisa Bertino , Ninghui Li Secure Anonymization for Incremental Datasets. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:48-63 [Conf ] Ilaria Bartolini , Elisa Bertino , Barbara Catania , Paolo Ciaccia , Matteo Golfarelli , Marco Patella , Stefano Rizzi PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project. [Citation Graph (0, 0)][DBLP ] SEBD, 2003, pp:293-300 [Conf ] Elisa Bertino , Stefano Franzoni , Marco Mesiti Memorizzazione di regole per l'instradamento di messaggi in un sistema di comunicazione universale. [Citation Graph (0, 0)][DBLP ] SEBD, 2003, pp:245-256 [Conf ] Elisa Bertino , Giovanna Guerrini , Marco Mesiti Exploiting User-Profiles for the Selective Dissemination of XML Documents. [Citation Graph (0, 0)][DBLP ] SEBD, 2004, pp:334-341 [Conf ] Alberto Belussi , Elisa Bertino , Andrea Nucita Grid Based Methods for the Spatial Join Estimation. [Citation Graph (0, 0)][DBLP ] SEBD, 2003, pp:49-60 [Conf ] Elisa Bertino , Claudio Bettini , Elena Ferrari , Pierangela Samarati A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:271-280 [Conf ] Pietro Mazzoleni , Stefano Valtolina , Stefano Franzoni , Piero Mussio , Elisa Bertino Towards a contextualized access to the cultural heritage world using 360 Panoramic Images. [Citation Graph (0, 0)][DBLP ] SEKE, 2006, pp:416-419 [Conf ] Pietro Mazzoleni , Elisa Bertino , Stefano Valtolina , Elena Ferrari , C. Boeri ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage. [Citation Graph (0, 0)][DBLP ] SIGGRAPH, 2003, pp:- [Conf ] Elisa Bertino , Silvana Castano , Elena Ferrari Securing XML Documents: the Author-X Project Demonstration. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2001, pp:605- [Conf ] Elisa Bertino , Donatella Castelli , Federica Vitale A Formal Representation for State Diagrams in the OMT Methodology. [Citation Graph (0, 0)][DBLP ] SOFSEM, 1996, pp:327-334 [Conf ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf ] Elena Ferrari , Pierangela Samarati , Elisa Bertino , Sushil Jajodia Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf ] Costantino Thanos , Carlo Carlesi , Elisa Bertino Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases. [Citation Graph (0, 0)][DBLP ] Symposium on Reliability in Distributed Software and Database Systems, 1983, pp:57-69 [Conf ] Manolis Terrovitis , Panos Vassiliadis , Spiros Skiadopoulos , Elisa Bertino , Barbara Catania , Anna Maddalena Modeling and Language Support for the Management of Pattern-Bases. [Citation Graph (0, 0)][DBLP ] SSDBM, 2004, pp:265-274 [Conf ] Elisa Bertino , Tsz S. Cheng , Shashi K. Gadia , Giovanna Guerrini A Linguistic Framework for Querying Dimensional Data. [Citation Graph (0, 0)][DBLP ] TIME, 2001, pp:156-163 [Conf ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini , Isabella Merlo Navigating Through Multiple Temporal Granularity Objects. [Citation Graph (0, 0)][DBLP ] TIME, 2001, pp:147-155 [Conf ] Elena Camossi , Elisa Bertino , Giovanna Guerrini , Marco Mesiti Evolution Specification of Multigranular Temporal Objects. [Citation Graph (0, 0)][DBLP ] TIME, 2002, pp:78-85 [Conf ] Isabella Merlo , Elisa Bertino , Elena Ferrari , Giovanna Guerrini A Temporal Object-Oriented Data Model with Multiple Granularities. [Citation Graph (0, 0)][DBLP ] TIME, 1999, pp:73-81 [Conf ] Isabella Merlo , Elisa Bertino , Elena Ferrari , Shashi K. Gadia , Giovanna Guerrini Querying Multiple Temporal Granularity Data. [Citation Graph (0, 0)][DBLP ] TIME, 2000, pp:103-114 [Conf ] Elisa Bertino , Alessandro Provetti , Franco Salvetti Reasoning about RDF statements with default rules. [Citation Graph (0, 0)][DBLP ] Rule Languages for Interoperability, 2005, pp:- [Conf ] Elisa Bertino , Barbara Catania , Gian Piero Zarri A Conceptual Annotation Approach to Indexing in a Web-Based Information System. [Citation Graph (0, 0)][DBLP ] WECWIS, 1999, pp:160-165 [Conf ] Bhavani M. Thuraisingham , Chris Clifton , Amar Gupta , Elisa Bertino , Elena Ferrari Directions for Web and E-Commerce Applications Security. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:200-204 [Conf ] Elisa Bertino , Silvana Castano , Elena Ferrari , Marco Mesiti Controlled Access and Dissemination of XML Documents. [Citation Graph (0, 5)][DBLP ] Workshop on Web Information and Data Management, 1999, pp:22-27 [Conf ] Massimo Mecella , Mourad Ouzzani , Federica Paci , Elisa Bertino Access control enforcement for conversation-based web services. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:257-266 [Conf ] Sunil Choenni , Elisa Bertino , Henk M. Blanken , Thiel Chang Index Configurations in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] TOOLS (13), 1994, pp:119-133 [Conf ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo Triggers in Java-based Databases. [Citation Graph (0, 0)][DBLP ] L'OBJET, 2000, v:6, n:3, pp:- [Journal ] Elisa Bertino , Daniela Musto Correctness of Semantic Integrity Checking in Database Management Systems. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1988, v:26, n:1/2, pp:25-57 [Journal ] Frédéric Cuppens , Hervé Debar , Elisa Bertino Foreword. [Citation Graph (0, 0)][DBLP ] Annales des Télécommunications, 2006, v:61, n:3-4, pp:242-244 [Journal ] Elisa Bertino , Elena Pagani , Gian Paolo Rossi , Pierangela Samarati Protecting information on the Web. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:11es, pp:3- [Journal ] Rafae Bhatti , Elisa Bertino , Arif Ghafoor An integrated approach to federated identity and privilege management in open systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:2, pp:81-87 [Journal ] Elisa Bertino An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems. [Citation Graph (0, 0)][DBLP ] Comput. J., 1987, v:30, n:6, pp:519-528 [Journal ] Elisa Bertino RBAC models - concepts and trends. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:511-514 [Journal ] Rafae Bhatti , Elisa Bertino , Arif Ghafoor , James Joshi XML-Based Specification for Web Services Document Security. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:4, pp:41-49 [Journal ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo A set-oriented method definition language for object databases and its semantics. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2003, v:15, n:14, pp:1275-1335 [Journal ] Elisa Bertino , Barbara Catania , Roberta Gori Enhancing the expressive power of the U-Datalog language [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Elisa Bertino , Barbara Catania , Paolo Perlasca Introducing Dynamic Behavior in Amalgamated Knowledge Bases [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Elisa Bertino , Igor Nai Fovino , Loredana Parasiliti Provenza A Framework for Evaluating Privacy Preserving Data Mining Algorithms. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2005, v:11, n:2, pp:121-154 [Journal ] Elisa Bertino , Fausto Rabitti Query Processing Based on Complex Object Types. [Citation Graph (0, 0)][DBLP ] IEEE Database Eng. Bull., 1986, v:9, n:4, pp:22-29 [Journal ] Elisa Bertino , Hans Weigand An Approach to Authorization Modeling in Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1994, v:12, n:1, pp:1-29 [Journal ] Elisa Bertino Data Security. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1998, v:25, n:1-2, pp:199-216 [Journal ] Elisa Bertino , Silvana Castano , Elena Ferrari , Marco Mesiti Protection and administration of XML data sources. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:237-260 [Journal ] Alberto Belussi , Elisa Bertino , Barbara Catania Using spatial data access structures for filtering nearest neighbor queries. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:40, n:1, pp:1-31 [Journal ] Yong-Moo Kwon , Elena Ferrari , Elisa Bertino Modeling Spatio-Temporal Constraints for Multimedia Objects. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1999, v:30, n:3, pp:217-238 [Journal ] Athena Vakali , Evimaria Terzi , Elisa Bertino , Ahmed K. Elmagarmid Hierarchical data placement for navigational multimedia applications. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2003, v:44, n:1, pp:49-80 [Journal ] Manolis Terrovitis , Panos Vassiliadis , Spiros Skiadopoulos , Elisa Bertino , Barbara Catania , Anna Maddalena , Stefano Rizzi Modeling and language support for the management of pattern-bases. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2007, v:62, n:2, pp:368-397 [Journal ] Elisa Bertino , Mauro Negri , Giuseppe Pelagatti , Licia Sbattella Applications of Object-Oriented Technology to the Integration of Heterogeneous Database Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 1994, v:2, n:4, pp:343-370 [Journal ] Elisa Bertino , M. Tamer Özsu Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 1994, v:2, n:1, pp:5-6 [Journal ] Elisa Bertino , Alberto Trombetta , Danilo Montesi Workflow Architecture for Interactive Video Management Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2002, v:11, n:1, pp:33-51 [Journal ] Rafae Bhatti , Elisa Bertino , Arif Ghafoor A Trust-Based Context-Aware Access Control Model for Web-Services. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2005, v:18, n:1, pp:83-105 [Journal ] Luigi V. Mancini , Indrajit Ray , Sushil Jajodia , Elisa Bertino Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal ] Elisa Bertino Review - Supporting Valid-Time Indeterminacy. [Citation Graph (0, 1)][DBLP ] ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal ] Elisa Bertino Review - Data Mining: An Overview from a Database Perspective. [Citation Graph (0, 1)][DBLP ] ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal ] Elisa Bertino Review - Role Hierarchies and Constraints for Lattice-Based Access Controls. [Citation Graph (0, 1)][DBLP ] ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal ] Elisa Bertino Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels. [Citation Graph (0, 1)][DBLP ] ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal ] Elisa Bertino Review - An Authorization Mechanism for a Relational Data Base System. [Citation Graph (0, 2)][DBLP ] ACM SIGMOD Digital Review, 1999, v:1, n:, pp:- [Journal ] Elisa Bertino , Athman Bouguettaya IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2002, v:3, n:7, pp:- [Journal ] Elisa Bertino , Barbara Catania , Gian Piero Zarri Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2001, v:47, n:1-2, pp:155-173 [Journal ] Elena Camossi , Michela Bertolotto , Elisa Bertino A multigranular object-oriented framework supporting spatio-temporal granularity conversions. [Citation Graph (0, 0)][DBLP ] International Journal of Geographical Information Science, 2006, v:20, n:5, pp:511-534 [Journal ] Elisa Bertino , Tiziana Catarci , Ahmed K. Elmagarmid , Mohand-Said Hacid Quality of Service Specification in Video Databases. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2003, v:10, n:4, pp:71-81 [Journal ] Elisa Bertino , Elena Ferrari , Andrea Perego Content-based filtering of Web documents: the MaX system and the EUFORBIA project. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2003, v:2, n:1, pp:45-58 [Journal ] Elisa Bertino , Pietro Mazzoleni , D. Santi Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2004, v:14, n:6, pp:545-564 [Journal ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia A theoretical formulation for degrees of isolation in databases. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 1997, v:39, n:1, pp:47-53 [Journal ] Elisa Bertino , Athman Bouguettaya Guest Editors' Introduction: Database Technology on the Web. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2002, v:6, n:4, pp:31-32 [Journal ] Elisa Bertino , Barbara Catania Integrating XML and Databases. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2001, v:5, n:4, pp:84-88 [Journal ] Elisa Bertino , Elena Ferrari XML and Data Integration. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2001, v:5, n:6, pp:75-76 [Journal ] Elisa Bertino , Silvana Castano , Elena Ferrari Securing XML Documents with Author-X. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2001, v:5, n:3, pp:21-0 [Journal ] Elisa Bertino , Krithi Ramamritham Guest Editors' Introduction: Data Dissemination on the Web. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2004, v:8, n:3, pp:27-28 [Journal ] Elisa Bertino , Steve Ruth Policies and IT Technologies: A Puzzle of Two Pieces. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2006, v:10, n:1, pp:65-67 [Journal ] James Joshi , Rafae Bhatti , Elisa Bertino , Arif Ghafoor Access-Control Language for Multidomain Environments. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2004, v:8, n:6, pp:40-50 [Journal ] Elisa Bertino , Barbara Catania , Limsoon Wong Finitely Representable Nested Relations. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:70, n:4, pp:165-173 [Journal ] Boris Shidlovsky , Elisa Bertino On the Number of Descendants in an Object DAG. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:58, n:5, pp:211-216 [Journal ] Elisa Bertino , Barbara Catania , Luca Chiesa Definition and Analysis of Index Organizations for Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1998, v:23, n:2, pp:65-108 [Journal ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini , Isabella Merlo T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2003, v:28, n:8, pp:885-927 [Journal ] Elisa Bertino , Giovanna Guerrini , Marco Mesiti A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2004, v:29, n:1, pp:23-46 [Journal ] Danilo Montesi , Elisa Bertino , Maria Bagnato Refined rules termination analysis through transactions. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2003, v:28, n:5, pp:435-456 [Journal ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:4, pp:311-352 [Journal ] Vijayalakshmi Atluri , Wei-kuang Huang , Elisa Bertino A Semantic-Based Execution Model for Multilevel Secure Workflows. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal ] Elisa Bertino , Francesco Buccafurri , Elena Ferrari , Pasquale Rullo A Logic-Based Approach for Enforcing Access Control. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Temporal Authorization Bases: From Specification to Integration. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal ] Elisa Bertino , Elena Ferrari Secure Object Deletion and Garbage Collection in Multilevel Object Bases. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal ] Elisa Bertino , Elena Ferrari , Giovanni Mella An approach to cooperative updates of XML documents in distributed systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:2, pp:191-242 [Journal ] Elisa Bertino , Fabio Origgi , Pierangela Samarati An Extended Authorization Model for Object Databases. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:2/3, pp:169-206 [Journal ] Abhilasha Bhargav-Spantzel , Anna Cinzia Squicciarini , Elisa Bertino Establishing and protecting digital identity in federation systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:3, pp:269-300 [Journal ] Elisa Bertino , Mohand-Said Hacid , Farouk Toumani Towards structure discovering in video data. [Citation Graph (0, 0)][DBLP ] J. Exp. Theor. Artif. Intell., 2005, v:17, n:1-2, pp:5-18 [Journal ] Elisa Bertino , Ahmed K. Elmagarmid , Mohand-Said Hacid A Knowledge-Based Approach to Visual Information. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2002, v:19, n:3, pp:319-341 [Journal ] Elisa Bertino , Ahmed K. Elmagarmid , Mohand-Said Hacid Ordering and Path Constraints over Semistructured Data. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2003, v:20, n:2, pp:181-206 [Journal ] Elisa Bertino , Barbara Catania , Vincenzo Gervasi , Alessandra Raffaetà A Logical Approach to Cooperative Information Systems. [Citation Graph (0, 0)][DBLP ] J. Log. Program., 2000, v:43, n:1, pp:15-48 [Journal ] Elisa Bertino , Barbara Carminati , Elena Ferrari Merkle Tree Authentication in UDDI Registries. [Citation Graph (0, 0)][DBLP ] Int. J. Web Service Res., 2004, v:1, n:2, pp:37-57 [Journal ] Elena Camossi , Elisa Bertino , Marco Mesiti , Giovanna Guerrini Handling Expiration of Multigranular Temporal Objects. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 2004, v:14, n:1, pp:23-50 [Journal ] Elisa Bertino , Barbara Catania A Constraint-Based Approach to Shape Management in Multimedia Databases. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 1998, v:6, n:1, pp:2-16 [Journal ] Elisa Bertino , Ahmed K. Elmagarmid , Mohand-Said Hacid A Logical Approach to Quality of Service Specification in Video Databases. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2004, v:23, n:2, pp:75-101 [Journal ] Philip A. Bernstein , Elisa Bertino , Andreas Heuer , Christian S. Jensen , Holger Meyer , M. Tamer Özsu , Richard T. Snodgrass , Kyu-Young Whang An apples-to-apples comparison of two database journals. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2005, v:34, n:4, pp:61-64 [Journal ] Elisa Bertino , Ahmed K. Elmagarmid , Mohand-Said Hacid Quality of Service in Multimedia Digital Libraries. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2001, v:30, n:1, pp:35-40 [Journal ] Elisa Bertino , Ahmed K. Elmagarmid , Mohand-Said Hacid A Database Approach to Quality of Service Specification in Video Databases. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2003, v:32, n:1, pp:35-40 [Journal ] Ji-Won Byun , Elisa Bertino Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2006, v:35, n:1, pp:9-13 [Journal ] Pietro Mazzoleni , Elisa Bertino , Elena Ferrari , Stefano Valtolina CiVeDi: A Customized Virtual Environment for Database Interaction. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2004, v:33, n:3, pp:15-20 [Journal ] Mourad Ouzzani , Walid G. Aref , Elisa Bertino , Ann Christine Catlin , Christopher W. Clifton , Wing-Kai Hon , Ahmed K. Elmagarmid , Arif Ghafoor , Susanne E. Hambrusch , Sunil Prabhakar , Jeffrey Scott Vitter , Xiang Zhang The Indiana Center for Database Systems at Purdue University. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2005, v:34, n:2, pp:53-58 [Journal ] Vassilios S. Verykios , Elisa Bertino , Igor Nai Fovino , Loredana Parasiliti Provenza , Yücel Saygin , Yannis Theodoridis State-of-the-art in privacy preserving data mining. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2004, v:33, n:1, pp:50-57 [Journal ] Elisa Bertino , Barbara Catania , A. Filippone An index allocation tool for object-oriented database systems. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2000, v:30, n:9, pp:973-1002 [Journal ] Elisa Bertino , Elena Ferrari , Pierangela Samarati Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model. [Citation Graph (0, 0)][DBLP ] TAPOS, 1998, v:4, n:3, pp:183-204 [Journal ] Elisa Bertino , Susan Darling Urban , Elke A. Rundensteiner Object-Oriented Databases and Applications - Selected Papers from ICDE'98. [Citation Graph (0, 0)][DBLP ] TAPOS, 1999, v:5, n:3, pp:125- [Journal ] Giovanna Guerrini , Elisa Bertino , Barbara Catania , Jesús García Molina A Formal View of Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP ] TAPOS, 1997, v:3, n:3, pp:157-183 [Journal ] Elisa Bertino , Ravi S. Sandhu Database Security-Concepts, Approaches, and Challenges. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:2-19 [Journal ] James Joshi , Elisa Bertino , Arif Ghafoor An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:157-175 [Journal ] Anna Cinzia Squicciarini , Elisa Bertino , Elena Ferrari , Indrakshi Ray Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:13-30 [Journal ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari TRBAC: A temporal role-based access control model. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:191-233 [Journal ] Elisa Bertino , Barbara Catania , Elena Ferrari A nested transaction model for multilevel secure database management systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:321-370 [Journal ] Elisa Bertino , Barbara Catania , Elena Ferrari , Paolo Perlasca A logical framework for reasoning about access control models. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:71-127 [Journal ] Elisa Bertino , Elena Ferrari Secure and selective dissemination of XML documents. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:290-331 [Journal ] Elisa Bertino , Elena Ferrari , Vijayalakshmi Atluri The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:65-104 [Journal ] Elisa Bertino , Sabrina De Capitani di Vimercati , Elena Ferrari , Pierangela Samarati Exception-Based Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:26-65 [Journal ] Rafae Bhatti , Arif Ghafoor , Elisa Bertino , James Joshi X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:187-227 [Journal ] Rafae Bhatti , Basit Shafiq , Elisa Bertino , Arif Ghafoor , James Joshi X-gtrbac admin: A decentralized administration model for enterprise-wide access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:388-423 [Journal ] Giovanni Mella , Elena Ferrari , Elisa Bertino , Yunhua Koglin Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:421-460 [Journal ] Maria Luisa Damiani , Elisa Bertino , Barbara Catania , Paolo Perlasca GEO-RBAC: A spatially aware RBAC. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:1, pp:- [Journal ] Nabil R. Adam , Vijayalakshmi Atluri , Elisa Bertino , Elena Ferrari A Content-Based Authorization Model for Digital Libraries. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:296-315 [Journal ] Alberto Belussi , Elisa Bertino , Barbara Catania An Extended Algebra for Constraint Databases. [Citation Graph (0, 36)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:5, pp:686-705 [Journal ] Vijayalakshmi Atluri , Sushil Jajodia , Elisa Bertino Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. [Citation Graph (0, 22)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:697-708 [Journal ] Elisa Bertino , Barbara Carminati , Elena Ferrari , Bhavani M. Thuraisingham , Amar Gupta Selective and Authentic Third-Party Distribution of XML Documents. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1263-1278 [Journal ] Elisa Bertino , Elena Ferrari , Giovanna Guerrini Navigational Accesses in a Temporal Object Model. [Citation Graph (0, 7)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:4, pp:656-665 [Journal ] Elisa Bertino , Elena Ferrari , Marco Stolf Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2001, v:13, n:2, pp:334- [Journal ] Elisa Bertino , Elena Ferrari , Anna Cinzia Squicciarini Trust-X: A Peer-to-Peer Framework for Trust Establishment. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:7, pp:827-842 [Journal ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo Trigger Inheritance and Overriding in an Active Object Database System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:4, pp:588-608 [Journal ] Elisa Bertino , Giovanna Guerrini , Isabella Merlo Extending the ODMG Object Model with Triggers. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:2, pp:170-188 [Journal ] Elisa Bertino , Richard R. Muntz , Thomas C. Rakow Guest Editorial: Introduction to the Special Section. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:58-59 [Journal ] Elisa Bertino , Beng Chin Ooi The Indispensability of Dispensable Indexes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 1999, v:11, n:1, pp:17-27 [Journal ] Elisa Bertino , Susan Darling Urban Guest Editorial: Introduction to the Special Section. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:1-2 [Journal ] Barbara Catania , Elisa Bertino Static Analysis of Logical Languages with Deferred Update Semantics. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:2, pp:386-404 [Journal ] James Joshi , Elisa Bertino , Usman Latif , Arif Ghafoor A Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:1, pp:4-23 [Journal ] Danilo Montesi , Elisa Bertino , Maurizio Martelli Transactions and Updates in Deductive Databases. [Citation Graph (0, 28)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:784-797 [Journal ] Indrajit Ray , Luigi V. Mancini , Sushil Jajodia , Elisa Bertino ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal ] Pierangela Samarati , Elisa Bertino , Alessandro Ciampichetti , Sushil Jajodia Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 9)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:524-538 [Journal ] Basit Shafiq , James Joshi , Elisa Bertino , Arif Ghafoor Secure Interoperation in a Multidomain Environment Employing RBAC Policies. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:11, pp:1557-1577 [Journal ] Vassilios S. Verykios , Ahmed K. Elmagarmid , Elisa Bertino , Yücel Saygin , Elena Dasseni Association Rule Hiding. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:4, pp:434-447 [Journal ] Elisa Bertino , Jianping Fan , Elena Ferrari , Mohand-Said Hacid , Ahmed K. Elmagarmid , Xingquan Zhu A hierarchical access control model for video database systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst., 2003, v:21, n:2, pp:155-191 [Journal ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati A Flexible Authorization Mechanism for Relational Data Management Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst., 1999, v:17, n:2, pp:101-140 [Journal ] Elisa Bertino , Barbara Catania , Roberta Gori Enhancing the expressive power of the U-Datalog language. [Citation Graph (0, 0)][DBLP ] TPLP, 2001, v:1, n:1, pp:105-122 [Journal ] Elisa Bertino , Barbara Catania , Paolo Perlasca Introducing Dynamic Behavior in Amalgamated Knowledge Bases. [Citation Graph (0, 0)][DBLP ] TPLP, 2003, v:3, n:6, pp:625-669 [Journal ] Rafae Bhatti , Elisa Bertino , Arif Ghafoor X-FEDERATE: A Policy Engineering Framework for Federated Access Management. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2006, v:32, n:5, pp:330-346 [Journal ] Elisa Bertino , L. R. Khan , Ravi S. Sandhu , Bhavani M. Thuraisingham Secure knowledge management: confidentiality, trust, and privacy. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:429-438 [Journal ] Elena Ferrari , Nabil R. Adam , Vijayalakshmi Atluri , Elisa Bertino , Ugo Capuozzo An authorization system for digital libraries. [Citation Graph (0, 0)][DBLP ] VLDB J., 2002, v:11, n:1, pp:58-67 [Journal ] Elisa Bertino , Silvana Castano , Elena Ferrari , Marco Mesiti Specifying and enforcing access control policies for XML document sources. [Citation Graph (0, 0)][DBLP ] World Wide Web, 2000, v:3, n:3, pp:139-151 [Journal ] Elisa Bertino , Tok Wang Ling , Umeshwar Dayal Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] World Wide Web, 2004, v:7, n:1, pp:5-6 [Journal ] Elisa Bertino , Anna Cinzia Squicciarini , Ivan Paloscia , Lorenzo Martino Ws-AC: A Fine Grained Access Control System for Web Services. [Citation Graph (0, 0)][DBLP ] World Wide Web, 2006, v:9, n:2, pp:143-171 [Journal ] Ji-Won Byun , Ashish Kamra , Elisa Bertino , Ninghui Li Efficient k -Anonymization Using Clustering Techniques. [Citation Graph (0, 0)][DBLP ] DASFAA, 2007, pp:188-200 [Conf ] Dan Lin , Hicham G. Elmongui , Elisa Bertino , Beng Chin Ooi Data Management in RFID Applications. [Citation Graph (0, 0)][DBLP ] DEXA, 2007, pp:434-444 [Conf ] Ashish Kundu , Elisa Bertino Secure Dissemination of XML Content Using Structure-based Routing. [Citation Graph (0, 0)][DBLP ] EDOC, 2006, pp:153-164 [Conf ] Qun Ni , Dan Lin , Elisa Bertino , Jorge Lobo Conditional Privacy-Aware Role Based Access Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:72-89 [Conf ] Abhilasha Bhargav-Spantzel , Anna Cinzia Squicciarini , Matthew Young , Elisa Bertino Privacy Requirements in Identity Management Solutions. [Citation Graph (0, 0)][DBLP ] HCI (9), 2007, pp:694-702 [Conf ] Anna Cinzia Squicciarini , Alberto Trombetta , Elisa Bertino Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. [Citation Graph (0, 0)][DBLP ] ICDCS, 2007, pp:57- [Conf ] Anna Cinzia Squicciarini , Abhilasha Bhargav-Spantzel , Elisa Bertino , Alexei B. Czeksis Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:386-397 [Conf ] Jacques Thomas , Federica Paci , Elisa Bertino , Patrick Eugster User Tasks and Access Control overWeb Services. [Citation Graph (0, 0)][DBLP ] ICWS, 2007, pp:60-69 [Conf ] Rafae Bhatti , Daniel Sanz , Elisa Bertino , Arif Ghafoor A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. [Citation Graph (0, 0)][DBLP ] ICWS, 2007, pp:447-454 [Conf ] Ebru Celikel , Murat Kantarcioglu , Bhavani M. Thuraisingham , Elisa Bertino Managing Risks in RBAC Employed Distributed Environments. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1548-1566 [Conf ] Prathima Rao , Dan Lin , Elisa Bertino XACML Function Annotations. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:178-182 [Conf ] Dan Lin , Prathima Rao , Elisa Bertino , Jorge Lobo An approach to evaluate policy similarity. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:1-10 [Conf ] Qun Ni , Alberto Trombetta , Elisa Bertino , Jorge Lobo Privacy-aware role based access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:41-50 [Conf ] Anna Cinzia Squicciarini , Ayça Azgin Hintoglu , Elisa Bertino , Yücel Saygin A privacy preserving assertion based policy language for federation systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:51-60 [Conf ] Monica Scannapieco , Ilya Figotin , Elisa Bertino , Ahmed K. Elmagarmid Privacy preserving schema and data matching. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2007, pp:653-664 [Conf ] Qihua Wang , Ting Yu , Ninghui Li , Jorge Lobo , Elisa Bertino , Keith Irwin , Ji-Won Byun On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:555-566 [Conf ] Marco Mesiti , Elisa Bertino , Giovanna Guerrini An abstraction-based approach to measuring the structural similarity between two unordered XML documents. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:316-321 [Conf ] Annie I. Antón , Elisa Bertino , Ninghui Li , Ting Yu A roadmap for comprehensive online privacy policy management. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:7, pp:109-116 [Journal ] Elisa Bertino , Elena Ferrari , Federica Paci , Loredana Parasiliti Provenza A system for securing push-based distribution of XML documents. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:4, pp:255-284 [Journal ] Xiaoxin Wu , Elisa Bertino An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:252-265 [Journal ] Anna Cinzia Squicciarini , Elisa Bertino , Elena Ferrari , Federica Paci , Bhavani M. Thuraisingham PP-trust-X: A system for privacy preserving trust negotiations. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal ] Ashish Kamra , Evimaria Terzi , Elisa Bertino Detecting anomalous access patterns in relational databases. [Citation Graph (0, 0)][DBLP ] VLDB J., 2008, v:0, n:, pp:- [Journal ] Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. [Citation Graph (, )][DBLP ] Location-Aware Authentication and Access Control. [Citation Graph (, )][DBLP ] High-Assurance Integrity Techniques for Databases. [Citation Graph (, )][DBLP ] D-algebra for composing access control policy decisions. [Citation Graph (, )][DBLP ] Physically restricted authentication with trusted hardware. [Citation Graph (, )][DBLP ] Risk-based access control systems built on fuzzy inferences. [Citation Graph (, )][DBLP ] Controlling data disclosure in computational PIR protocols. [Citation Graph (, )][DBLP ] The Challenge of Assuring Data Trustworthiness. [Citation Graph (, )][DBLP ] Querying Multigranular Spatio-temporal Objects. [Citation Graph (, )][DBLP ] Publishing Time-Series Data under Preservation of Privacy and Distance Orders. [Citation Graph (, )][DBLP ] A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations. [Citation Graph (, )][DBLP ] Password policy simulation and analysis. [Citation Graph (, )][DBLP ] Receipt management- transaction history based trust establishment. [Citation Graph (, )][DBLP ] Identity-based long running negotiations. [Citation Graph (, )][DBLP ] Minimal credential disclosure in trust negotiations. [Citation Graph (, )][DBLP ] Self-tuning query mesh for adaptive multi-route query processing. [Citation Graph (, )][DBLP ] How to authenticate graphs without leaking. [Citation Graph (, )][DBLP ] Private record matching using differential privacy. [Citation Graph (, )][DBLP ] Multigranular spatio-temporal models: implementation challenges. [Citation Graph (, )][DBLP ] Security and privacy for geospatial data: concepts and research directions. [Citation Graph (, )][DBLP ] Position transformation: a location privacy protection method for moving objects. [Citation Graph (, )][DBLP ] Preventing velocity-based linkage attacks in location-aware applications. [Citation Graph (, )][DBLP ] Assessing the trustworthiness of location data based on provenance. [Citation Graph (, )][DBLP ] The Design and Evaluation of Accountable Grid Computing System. [Citation Graph (, )][DBLP ] Continuous Intersection Joins Over Moving Objects. [Citation Graph (, )][DBLP ] Privately Updating Suppression and Generalization based k-Anonymous Databases. [Citation Graph (, )][DBLP ] A Hybrid Approach to Private Record Linkage. [Citation Graph (, )][DBLP ] A Security Punctuation Framework for Enforcing Access Control on Streaming Data. [Citation Graph (, )][DBLP ] Protecting Databases from Query Flood Attacks. [Citation Graph (, )][DBLP ] Secure Delta-Publishing of XML Content. [Citation Graph (, )][DBLP ] Trust establishment in the formation of Virtual Organizations. [Citation Graph (, )][DBLP ] Using Anonymized Data for Classification. [Citation Graph (, )][DBLP ] A privacy-preserving approach to policy-based content dissemination. [Citation Graph (, )][DBLP ] FENCE: Continuous access control enforcement in dynamic data stream environments. [Citation Graph (, )][DBLP ] Credibility-enhanced curated database: Improving the value of curated databases. [Citation Graph (, )][DBLP ] A Comprehensive Approach for Solving Policy Heterogeneity. [Citation Graph (, )][DBLP ] A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations. [Citation Graph (, )][DBLP ] Privacy Preserving OLAP over Distributed XML Documents. [Citation Graph (, )][DBLP ] Authorization and User Failure Resiliency for WS-BPEL Business Processes. [Citation Graph (, )][DBLP ] The SCIFC Model for Information Flow Control in Web Service Composition. [Citation Graph (, )][DBLP ] Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. [Citation Graph (, )][DBLP ] Policy-Driven Service Composition with Information Flow Control. [Citation Graph (, )][DBLP ] A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. [Citation Graph (, )][DBLP ] P-CDN: Extending access control capabilities of P2P systems to provide CDN services. [Citation Graph (, )][DBLP ] VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. [Citation Graph (, )][DBLP ] Interactive Location Cloaking with the PROBE Obfuscator. [Citation Graph (, )][DBLP ] Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Proactive Role Discovery in Mediator-Free Environments. [Citation Graph (, )][DBLP ] Automatic Compliance of Privacy Policies in Federated Digital Identity Management. [Citation Graph (, )][DBLP ] EXAM: An Environment for Access Control Policy Analysis and Management. [Citation Graph (, )][DBLP ] Visualization for Access Control Policy Analysis Results Using Multi-level Grids. [Citation Graph (, )][DBLP ] Digital identity management and protection. [Citation Graph (, )][DBLP ] Database Intrusion Detection and Response. [Citation Graph (, )][DBLP ] Privilege States Based Access Control for Fine-Grained Intrusion Response. [Citation Graph (, )][DBLP ] A secure multiparty computation privacy preserving OLAP framework over distributed XML data. [Citation Graph (, )][DBLP ] An obligation model bridging access control policies and privacy policies. [Citation Graph (, )][DBLP ] Policy decomposition for collaborative access control. [Citation Graph (, )][DBLP ] Mining roles with semantic meanings. [Citation Graph (, )][DBLP ] An algebra for fine-grained integration of XACML policies. [Citation Graph (, )][DBLP ] Supporting RBAC with XACML+OWL. [Citation Graph (, )][DBLP ] Automating role-based provisioning by learning from examples. [Citation Graph (, )][DBLP ] Access control policy combining: theory meets practice. [Citation Graph (, )][DBLP ] Enforcing spatial constraints for mobile RBAC systems. [Citation Graph (, )][DBLP ] Assuring Data Trustworthiness - Concepts and Research Challenges. [Citation Graph (, )][DBLP ] An Approach to Evaluate Data Trustworthiness Based on Data Provenance. [Citation Graph (, )][DBLP ] ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. [Citation Graph (, )][DBLP ] Responding to Anomalous Database Requests. [Citation Graph (, )][DBLP ] Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP ] An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP ] Privacy-Preserving Techniques for Location-Based Services. [Citation Graph (, )][DBLP ] VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. [Citation Graph (, )][DBLP ] StreamShield : a stream-centric approach towards security and privacy in data stream environments. [Citation Graph (, )][DBLP ] Mask: a system for privacy-preserving policy-based access to published content. [Citation Graph (, )][DBLP ] A Hybrid Technique for Private Location-Based Queries with Database Protection. [Citation Graph (, )][DBLP ] Adaptive Management of Multigranular Spatio-Temporal Object Attributes. [Citation Graph (, )][DBLP ] Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP ] Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. [Citation Graph (, )][DBLP ] Information carrying identity proof trees. [Citation Graph (, )][DBLP ] Aggregating uncertain access risk estimations from different sources invited paper. [Citation Graph (, )][DBLP ] A structure preserving approach for securing XML documents. [Citation Graph (, )][DBLP ] A Federated Digital Identity Management Approach for Business Processes. [Citation Graph (, )][DBLP ] Profiling Database Application to Detect SQL Injection Attacks. [Citation Graph (, )][DBLP ] L'Elimination de la subjectivité dans la recommandation de confiance. [Citation Graph (, )][DBLP ] Privacy-preserving management of transactions' receipts for mobile environments. [Citation Graph (, )][DBLP ] Biometrics-based identifiers for digital identity management. [Citation Graph (, )][DBLP ] Efficient and privacy-preserving enforcement of attribute-based access control. [Citation Graph (, )][DBLP ] Cryptanalysis of the LCSS RFID Authentication Protocol. [Citation Graph (, )][DBLP ] Assured information sharing: concepts and issues. [Citation Graph (, )][DBLP ] Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP ] A Policy-Based Accountability Tool for Grid Computing Systems. [Citation Graph (, )][DBLP ] Multi-granular Spatio-temporal Object Models: Concepts and Research Directions. [Citation Graph (, )][DBLP ] Trustworthy objects. [Citation Graph (, )][DBLP ] Replacing Lost or Stolen E-Passports. [Citation Graph (, )][DBLP ] An Interoperable Approach to Multifactor Identity Verification. [Citation Graph (, )][DBLP ] Privacy-preserving Digital Identity Management for Cloud Computing. [Citation Graph (, )][DBLP ] Search in 0.364secs, Finished in 0.389secs