The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Elisa Bertino: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elisa Bertino, Won Kim
    Indexing Techniques for Queries on Nested Objects. [Citation Graph (51, 14)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1989, v:1, n:2, pp:196-214 [Journal]
  2. Won Kim, Elisa Bertino, Jorge F. Garza
    Composite Objects Revisted. [Citation Graph (43, 13)][DBLP]
    SIGMOD Conference, 1989, pp:337-347 [Conf]
  3. Elisa Bertino
    A View Mechanism for Object-Oriented Databases. [Citation Graph (29, 10)][DBLP]
    EDBT, 1992, pp:136-151 [Conf]
  4. Fausto Rabitti, Elisa Bertino, Won Kim, Darrell Woelk
    A Model of Authorization for Next-Generation Database Systems. [Citation Graph (20, 10)][DBLP]
    ACM Trans. Database Syst., 1991, v:16, n:1, pp:88-131 [Journal]
  5. Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella
    Object-Oriented Query Languages: The Notion and the Issues. [Citation Graph (16, 59)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1992, v:4, n:3, pp:223-237 [Journal]
  6. Elisa Bertino
    An Indexing Technique for Object-Oriented Databases. [Citation Graph (13, 3)][DBLP]
    ICDE, 1991, pp:160-170 [Conf]
  7. Elisa Bertino, Fausto Rabitti, Simon J. Gibbs
    Query Processing in a Multimedia Document System. [Citation Graph (12, 0)][DBLP]
    ACM Trans. Inf. Syst., 1988, v:6, n:1, pp:1-41 [Journal]
  8. Elisa Bertino, Lorenzo Martino
    Object-Oriented Database Management Systems: Concepts and Issues. [Citation Graph (10, 0)][DBLP]
    IEEE Computer, 1991, v:24, n:4, pp:33-47 [Journal]
  9. Stavros Christodoulakis, J. Vanderbroek, J. Li, T. Li, S. Wan, Y. Wang, M. Papa, Elisa Bertino
    Development of a Multimedia Information System for an Office Environment. [Citation Graph (9, 14)][DBLP]
    VLDB, 1984, pp:261-271 [Conf]
  10. Elisa Bertino
    Optimization of Queries using Nested Indices. [Citation Graph (7, 5)][DBLP]
    EDBT, 1990, pp:44-59 [Conf]
  11. Elisa Bertino
    Integration of Heterogeneous Data Repositories by Using Object-Oriented Views. [Citation Graph (7, 0)][DBLP]
    RIDE-IMS, 1991, pp:22-29 [Conf]
  12. Laura M. Haas, Patricia G. Selinger, Elisa Bertino, Dean Daniels, Bruce G. Lindsay, Guy M. Lohman, Yoshifumi Masunaga, C. Mohan, Pui Ng, Paul F. Wilms, Robert A. Yost
    R*: A Research Project on Distributed Relational DBMS. [Citation Graph (7, 0)][DBLP]
    IEEE Database Eng. Bull., 1982, v:5, n:4, pp:28-32 [Journal]
  13. Elisa Bertino, Paola Foscoli
    Index Organizations for Object-Oriented Database Systems. [Citation Graph (7, 20)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:2, pp:193-209 [Journal]
  14. Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella
    Integration of heterogeneous database applications through an object-oriented interface. [Citation Graph (6, 0)][DBLP]
    Inf. Syst., 1989, v:14, n:5, pp:407-420 [Journal]
  15. Elisa Bertino, Laura M. Haas
    Views and Security in Distributed Database Management Systems. [Citation Graph (5, 18)][DBLP]
    EDBT, 1988, pp:155-169 [Conf]
  16. Elisa Bertino, Danilo Montesi
    Towards a Logical-Object Oriented Programming Language for Databases. [Citation Graph (5, 14)][DBLP]
    EDBT, 1992, pp:168-183 [Conf]
  17. Elisa Bertino
    Index Configuration in Object-Oriented Databases [Citation Graph (5, 29)][DBLP]
    VLDB J., 1994, v:3, n:3, pp:355-399 [Journal]
  18. Elisa Bertino, Elena Ferrari, Giovanna Guerrini
    A Formal Temporal Object-Oriented Data Model. [Citation Graph (4, 8)][DBLP]
    EDBT, 1996, pp:342-356 [Conf]
  19. Elisa Bertino, Paola Foscoli
    An Analytical Model of Object-Oriented Query Costs. [Citation Graph (4, 0)][DBLP]
    POS, 1992, pp:241-261 [Conf]
  20. Alberto Belussi, Elisa Bertino, Barbara Catania
    Manipulating Spatial Data in Constraint Databases. [Citation Graph (4, 0)][DBLP]
    SSD, 1997, pp:115-141 [Conf]
  21. Elisa Bertino, Laura M. Haas, Bruce G. Lindsay
    View Management in Distributed Data Base Systems. [Citation Graph (4, 4)][DBLP]
    VLDB, 1983, pp:376-378 [Conf]
  22. Elisa Bertino, Barbara Catania, Boris Shidlovsky
    Towards Optimal Two-Dimensional Indexing for Constraint Databases. [Citation Graph (4, 0)][DBLP]
    Inf. Process. Lett., 1997, v:64, n:1, pp:1-8 [Journal]
  23. Elisa Bertino, Paola Foscoli
    On Modeling Cost Functions for Object-Oriented Databases. [Citation Graph (4, 24)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:3, pp:500-508 [Journal]
  24. Elisa Bertino
    Data Hiding and Security in Object-Oriented Databases. [Citation Graph (3, 6)][DBLP]
    ICDE, 1992, pp:338-347 [Conf]
  25. Sunil Choenni, Elisa Bertino, Henk M. Blanken, Thiel Chang
    On the Selection of Optimal Index Configuration in OO Databases. [Citation Graph (3, 9)][DBLP]
    ICDE, 1994, pp:526-537 [Conf]
  26. Boris Shidlovsky, Elisa Bertino
    A Graph-Theoretic Approach to Indexing in Object-Oriented Databases. [Citation Graph (3, 11)][DBLP]
    ICDE, 1996, pp:230-237 [Conf]
  27. Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia
    Semantic Assumptions and Query Evaluation in Temporal Databases. [Citation Graph (3, 13)][DBLP]
    SIGMOD Conference, 1995, pp:257-268 [Conf]
  28. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino
    A Unified Framework for Enforcing Multiple Access Control Policies. [Citation Graph (3, 12)][DBLP]
    SIGMOD Conference, 1997, pp:474-485 [Conf]
  29. Elisa Bertino, C. Guglielmina
    Path-Index: An Approach to the Efficient Execution of Object-Oriented Queries. [Citation Graph (3, 0)][DBLP]
    Data Knowl. Eng., 1993, v:10, n:, pp:1-27 [Journal]
  30. Costantino Thanos, Elisa Bertino, Carlo Carlesi
    The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System. [Citation Graph (3, 0)][DBLP]
    Perform. Eval., 1988, v:8, n:2, pp:129-157 [Journal]
  31. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A Temporal Access Control Mechanism for Database Systems. [Citation Graph (3, 10)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:67-80 [Journal]
  32. Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    An Authorization Model for a Distributed Hypertext System. [Citation Graph (3, 13)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:4, pp:555-562 [Journal]
  33. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf]
  34. Elisa Bertino, Claudio Bettini, Pierangela Samarati
    A Temporal Authorization Model. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:126-135 [Conf]
  35. Elisa Bertino, Giovanna Guerrini
    Objects with Multiple Most Specific Classes. [Citation Graph (2, 0)][DBLP]
    ECOOP, 1995, pp:102-126 [Conf]
  36. Elisa Bertino, Maurizio Martelli, Danilo Montesi
    Modelling Database Updates with Constraint Logic Programming. [Citation Graph (2, 0)][DBLP]
    FMLDO, 1992, pp:121-132 [Conf]
  37. Elisa Bertino, R. Gagliardi, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella
    The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications. [Citation Graph (2, 0)][DBLP]
    OODBS, 1988, pp:213-218 [Conf]
  38. Elisa Bertino, Barbara Catania, Giovanna Guerrini, Danilo Montesi
    Transaction Optimization in Rule Databases. [Citation Graph (2, 0)][DBLP]
    RIDE-ADS, 1994, pp:137-145 [Conf]
  39. Elisa Bertino, C. Guglielmina
    Optimization of Object-Oriented Queries Using Path Indices. [Citation Graph (2, 0)][DBLP]
    RIDE-TQP, 1992, pp:140-149 [Conf]
  40. Elisa Bertino, Giovanna Guerrini, Danilo Montesi
    Towards Deductice Object Databases. [Citation Graph (2, 0)][DBLP]
    TAPOS, 1995, v:1, n:1, pp:19-39 [Journal]
  41. Elisa Bertino, Elena Ferrari
    Temporal Synchronization Models for Multimedia Data. [Citation Graph (2, 36)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:4, pp:612-631 [Journal]
  42. Elisa Bertino, Maria Damiani, Paolo Randi
    An Approach to Integrate Multimedi Data in a Knowledge Representation System. [Citation Graph (1, 0)][DBLP]
    Advanced Visual Interfaces, 1992, pp:109-123 [Conf]
  43. Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini
    An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf]
  44. Barbara Catania, Alberto Belussi, Elisa Bertino
    Introducing External Functions in Constraint Query Languages. [Citation Graph (1, 0)][DBLP]
    CP, 1998, pp:132-146 [Conf]
  45. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:259-274 [Conf]
  46. Elisa Bertino, Fabio Origgi, Pierangela Samarati
    A new Authorization Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:199-222 [Conf]
  47. Elisa Bertino, Barbara Catania, Giovanna Guerrini, Danilo Montesi
    Static Analysis of Transactional Intensional Databases. [Citation Graph (1, 0)][DBLP]
    Workshop on Deductive Databases and Logic Programming, 1994, pp:57-73 [Conf]
  48. Elisa Bertino, Maurizio Martelli, Danilo Montesi
    Modeling Database Updates with Constraint Logic Programming. [Citation Graph (1, 0)][DBLP]
    Workshop on Deductive Databases, JICSLP, 1992, pp:175-184 [Conf]
  49. Elisa Bertino, Sushil Jajodia
    Modeling Multilevel Entities Using Single Level Objects. [Citation Graph (1, 0)][DBLP]
    DOOD, 1993, pp:415-428 [Conf]
  50. Costantino Thanos, Carlo Carlesi, Elisa Bertino
    Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System. [Citation Graph (1, 0)][DBLP]
    ECI, 1981, pp:266-279 [Conf]
  51. Elisa Bertino, Elena Ferrari, Giovanna Guerrini, Isabella Merlo
    Extending the ODMG Object Model with Time. [Citation Graph (1, 0)][DBLP]
    ECOOP, 1998, pp:41-66 [Conf]
  52. Elisa Bertino, Giovanna Guerrini, Danilo Montesi
    Deductive Object Databases. [Citation Graph (1, 0)][DBLP]
    ECOOP, 1994, pp:213-235 [Conf]
  53. Elisa Bertino
    Distributed Database Design Using the Entity-Relationship Model. [Citation Graph (1, 14)][DBLP]
    ER, 1983, pp:189-203 [Conf]
  54. Elisa Bertino, Sandro Bottarelli, Maria Damiani, M. Marcadella, M. Migliorati, Paolo Randi
    The ADKMS Knowledge Acquisition System. [Citation Graph (1, 0)][DBLP]
    Future Databases, 1992, pp:298-314 [Conf]
  55. Elisa Bertino, Carlo Meghini, Costantino Thanos
    The Update Problem in the Distributed Database System Hermes/1. [Citation Graph (1, 0)][DBLP]
    ICOD, 1983, pp:317-331 [Conf]
  56. Elisa Bertino, Barbara Catania
    Static Analysis of Intensional Databases in U-Datalog. [Citation Graph (1, 15)][DBLP]
    PODS, 1996, pp:202-212 [Conf]
  57. Elisa Bertino, A. Quarati
    An Approach to Support Method Invocations in Object-Oriented Queries. [Citation Graph (1, 0)][DBLP]
    RIDE-TQP, 1992, pp:163-168 [Conf]
  58. Elisa Bertino, Elena Ferrari, Giovanna Guerrini
    An Approach to Model and Query Event-Based Temporal Data. [Citation Graph (1, 0)][DBLP]
    TIME, 1998, pp:122-131 [Conf]
  59. Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati
    On Using Materialization Strategies for a Temporal Authorization Model. [Citation Graph (1, 0)][DBLP]
    VIEWS, 1996, pp:34-42 [Conf]
  60. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. [Citation Graph (1, 6)][DBLP]
    VLDB, 1996, pp:472-483 [Conf]
  61. Elisa Bertino, Daniela Musto
    Query optimization by using knowledge about data semantics. [Citation Graph (1, 0)][DBLP]
    Data Knowl. Eng., 1992, v:9, n:, pp:121-155 [Journal]
  62. Elisa Bertino, Amani A. Saad, Mohamed A. Ismail
    Clustering Techniques in Object Bases: A Survey. [Citation Graph (1, 0)][DBLP]
    Data Knowl. Eng., 1994, v:12, n:3, pp:255-275 [Journal]
  63. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    Decentralized Administration for a Temporal Access Control Model. [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1997, v:22, n:4, pp:223-248 [Journal]
  64. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Database Security: Research and Practice [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1995, v:20, n:7, pp:537-556 [Journal]
  65. Giovanna Guerrini, Elisa Bertino, René Bal
    A Formal Definition of the Chimera Object-Oriented Data Model. [Citation Graph (1, 0)][DBLP]
    J. Intell. Inf. Syst., 1998, v:11, n:1, pp:5-40 [Journal]
  66. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Access Control in Object-Oriented Database Systems - Some Approaches and Issues. [Citation Graph (1, 0)][DBLP]
    , 1993, v:, n:, pp:17-44 [Journal]
  67. Elisa Bertino, Elena Ferrari, Giovanna Guerrini
    T_Chimera: A Temporal Object-Oriented Data Model. [Citation Graph (1, 0)][DBLP]
    TAPOS, 1997, v:3, n:2, pp:103-125 [Journal]
  68. Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
    Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. [Citation Graph (1, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:5, pp:839-854 [Journal]
  69. Elisa Bertino, Elena Ferrari, Marco Stolf
    MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:102-125 [Journal]
  70. Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal]
  71. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    An Extended Authorization Model for Relational Databases. [Citation Graph (1, 16)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:85-101 [Journal]
  72. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. [Citation Graph (1, 18)][DBLP]
    ACM Trans. Database Syst., 1998, v:23, n:3, pp:231-285 [Journal]
  73. Elisa Bertino, Anna Cinzia Squicciarini, D. Mevi
    A Fine-Grained Access Control Model for Web Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:33-40 [Conf]
  74. Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino
    Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:77-86 [Conf]
  75. Elisa Bertino, Lorenzo Martino
    Security in SOA and Web Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2006, pp:- [Conf]
  76. Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali
    Intrusion Detection in RBAC-administered Databases. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:170-182 [Conf]
  77. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Specifying and computing hierarchies of temporal authorizations. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1999, pp:243-258 [Conf]
  78. Elisa Bertino, Barbara Catania, Giovanna Guerrini, Maurizio Martelli, Danilo Montesi
    Formalizzazione e Ottimizzazione di Transazioni di modifica in CLP(AD). [Citation Graph (0, 0)][DBLP]
    GULP, 1993, pp:501-518 [Conf]
  79. Elisa Bertino, Barbara Catania, Giovanna Guerrini, Maurizio Martelli, Danilo Montesi
    A Bottom-Up Interpreter for a Database Language with Updates and Transactions. [Citation Graph (0, 0)][DBLP]
    GULP-PRODE (2), 1994, pp:206-220 [Conf]
  80. Elisa Bertino, Alessandra Mileo, Alessandro Provetti
    User Preferences VS Minimality in PPDL. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 2003, pp:110-122 [Conf]
  81. Elisa Bertino, Alessandro Provetti, Franco Salvetti
    Local Closed-World Assumptions for reasoning about Semantic Web data. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 2003, pp:314-323 [Conf]
  82. Elisa Bertino, Giovanni Chiola, Luigi V. Mancini
    Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. [Citation Graph (0, 0)][DBLP]
    ICATPN, 1998, pp:266-285 [Conf]
  83. Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, Elisa Bertino
    A semantic approach to build personalized interfaces in the cultural heritage domain. [Citation Graph (0, 0)][DBLP]
    AVI, 2006, pp:306-309 [Conf]
  84. Elisa Bertino
    Purpose based access control for privacy protection. [Citation Graph (0, 0)][DBLP]
    BDA, 2004, pp:243- [Conf]
  85. Elisa Bertino, Dolores Cuadra, Paloma Martínez
    An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2005, pp:119-134 [Conf]
  86. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf]
  87. Elisa Bertino, Barbara Carminati, Elena Ferrari
    A temporal key management scheme for secure broadcasting of XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:31-40 [Conf]
  88. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf]
  89. Mohamed Shehab, Elisa Bertino, Arif Ghafoor
    Secure collaboration in mediator-free environments. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:58-67 [Conf]
  90. Alberto Belussi, Elisa Bertino, Michela Bertolotto, Barbara Catania
    Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases. [Citation Graph (0, 0)][DBLP]
    CDB, 1995, pp:40-67 [Conf]
  91. Elisa Bertino, Barbara Catania, Stéphane Bressan
    Integrity Constraint Checking in Chimera. [Citation Graph (0, 0)][DBLP]
    CDB, 1997, pp:160-186 [Conf]
  92. Barbara Carminati, Elena Ferrari, Elisa Bertino
    Securing XML data in third-party distribution systems. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:99-106 [Conf]
  93. Elisa Bertino, Moustafa A. Hammad, Walid G. Aref, Ahmed K. Elmagarmid
    An Access Control Model for Video Database Systems. [Citation Graph (0, 0)][DBLP]
    CIKM, 2000, pp:336-343 [Conf]
  94. Elisa Bertino, S. Salerno, Boris Shidlovsky
    Enhanced Nested-Inherited Index for OODBMS. [Citation Graph (0, 5)][DBLP]
    CIKM, 1995, pp:58-65 [Conf]
  95. Jianping Fan, Hangzai Luo, Mohand-Said Hacid, Elisa Bertino
    A novel approach for privacy-preserving video sharing. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:609-616 [Conf]
  96. Danilo Montesi, Elisa Bertino
    Queries, Constraints, Updates and Transactions Within a Logic-Based Language. [Citation Graph (0, 0)][DBLP]
    CIKM, 1993, pp:500-506 [Conf]
  97. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
    Trust-Chi: An XML Framework for Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:146-157 [Conf]
  98. Elisa Bertino, Maurizio Martelli, Danilo Montesi
    CLP (X) as a framework for action and deduction. [Citation Graph (0, 0)][DBLP]
    CNKBS, 1992, pp:27-29 [Conf]
  99. Elisa Bertino
    Protecting XML Documents: Position Paper. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:132-0 [Conf]
  100. Elisa Bertino
    Protecting Information in the Web - Position Paper. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1999, pp:50-0 [Conf]
  101. Elisa Bertino, Elena Ferrari
    Data Security. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1998, pp:228-239 [Conf]
  102. Elisa Bertino, Elena Ferrari, Andrea Perego
    Ma X : An Access Control System for Digital Libraries and the Web. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:945-950 [Conf]
  103. James Joshi, Elisa Bertino, Arif Ghafoor
    Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:951-956 [Conf]
  104. Elisa Bertino, Dennis McLeod
    PC Co-chairs' Message. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE, 2003, pp:2-3 [Conf]
  105. Elisa Bertino, Anna Cinzia Squicciarini
    A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:14- [Conf]
  106. Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo
    A Logical Framework for Reasoning on Data Access Control Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:175-189 [Conf]
  107. Elisa Bertino, Barbara Catania, Vincenzo Gervasi, Alessandra Raffaetà
    Active-U-Datalog: Integrating Active Rules in a Logical Update Language. [Citation Graph (0, 0)][DBLP]
    Transactions and Change in Logic Databases, 1998, pp:107-133 [Conf]
  108. Elisa Bertino
    Purpose Based Access Control for Privacy Protection in Database Systems. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2005, pp:2- [Conf]
  109. Elisa Bertino, Barbara Catania, Boris Chidlovskii
    Approximation Techniques for Indexing Two-Dimensional Constraint Databases. [Citation Graph (0, 12)][DBLP]
    DASFAA, 1999, pp:213-220 [Conf]
  110. Elisa Bertino, Barbara Catania, Paolo Perlasca
    Introducing Cooperation and Actions in Amalgamated Knowledge Bases. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2001, pp:108-115 [Conf]
  111. Elisa Bertino, Igor Nai Fovino
    Information Driven Evaluation of Data Hiding Algorithms. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2005, pp:418-427 [Conf]
  112. Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni
    Supporting Delegation in Secure Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:190-202 [Conf]
  113. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:135-158 [Conf]
  114. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:231-247 [Conf]
  115. Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
    An Execution Model for Multilevel Seccure Workflows. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:151-165 [Conf]
  116. Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti
    Author-X: A Java-Based System for XML Data Protection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:15-26 [Conf]
  117. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Specifying and Computing Hierarchies of Temporal Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:285-300 [Conf]
  118. Elisa Bertino, Elena Ferrari
    A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:95-109 [Conf]
  119. Elisa Bertino, Elena Ferrari
    Administration Policies in a Multipolicy Autorization System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:341-355 [Conf]
  120. Elisa Bertino, Elena Ferrari, Giovanni Mella
    Distributed Cooperative Updates of XML Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:147-159 [Conf]
  121. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
    A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:176-189 [Conf]
  122. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
    Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:289-298 [Conf]
  123. Elisa Bertino, Bruno Crispo, Pietro Mazzoleni
    Supporting Multi-Dimensional Trustworthiness for Grid Workflows. [Citation Graph (0, 0)][DBLP]
    DELOS Workshop: Digital Library Architectures, 2004, pp:195-204 [Conf]
  124. Elisa Bertino, Danilo Montesi
    Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation. [Citation Graph (0, 0)][DBLP]
    DEXA, 1990, pp:500-507 [Conf]
  125. Elisa Bertino, Elena Ferrari, Andrea Perego, Gian Piero Zarri
    A Multi-Strategy Approach to Rating and Filtering Online Resources. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:519-523 [Conf]
  126. Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino
    Establishing and protecting digital identity in federation systems. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:11-19 [Conf]
  127. Basit Shafiq, Elisa Bertino, Arif Ghafoor
    Access control management in a distributed environment supporting dynamic collaboration. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:104-112 [Conf]
  128. Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino
    Privacy preserving multi-factor authentication with biometrics. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2006, pp:63-72 [Conf]
  129. Elisa Bertino, Barbara Carminati, Elena Ferrari, Giovanni Mella
    Author-Chi - A System for Secure Dissemination and Update of XML Documents. [Citation Graph (0, 0)][DBLP]
    DNIS, 2003, pp:66-85 [Conf]
  130. Elisa Bertino, Stefano Franzoni, Pietro Mazzoleni, Stefano Valtolina
    Integration of Virtual Reality and Database System Techniques. [Citation Graph (0, 0)][DBLP]
    DNIS, 2005, pp:92-103 [Conf]
  131. Elisa Bertino, Giovanna Guerrini, Isabella Merlo
    Trigger Inheritance and Overriding in Active Object Database Systems. [Citation Graph (0, 0)][DBLP]
    DOOD, 1997, pp:193-210 [Conf]
  132. Elisa Bertino, Giovanna Guerrini, Isabella Merlo, Marco Mesiti
    An Approach to Classify Semi-structured Objects. [Citation Graph (0, 0)][DBLP]
    ECOOP, 1999, pp:416-440 [Conf]
  133. Elisa Bertino, Giovanna Guerrini, Isabella Merlo
    Exception Handling in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Advances in Exception Handling Techniques, 2000, pp:234-250 [Conf]
  134. Elisa Bertino, Barbara Catania, Boris Shidlovsky
    Towards Optimal Indexing for Segment Databases. [Citation Graph (0, 18)][DBLP]
    EDBT, 1998, pp:39-53 [Conf]
  135. Elisa Bertino, Fausto Rabitti, Costantino Thanos
    MULTOS: a Document Server for Distributed Office Systems. [Citation Graph (0, 3)][DBLP]
    EDBT, 1988, pp:606-615 [Conf]
  136. Elisa Bertino, Giovanna Guerrini, Marco Mesiti
    DiXeminator: A Profile-Based Selective Dissemination System for XML Documents. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2004, pp:578-587 [Conf]
  137. Elisa Bertino, Giovanna Guerrini, Marco Mesiti, Luigi Tosetto
    Evolving a Set of DTDs According to a Dynamic Set of XML Documents. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2002, pp:45-66 [Conf]
  138. Elisa Bertino, Maurizio Martelli, Danilo Montesi
    CLP(AD) as a Deductive Database Language with Updates. [Citation Graph (0, 0)][DBLP]
    ELP, 1992, pp:80-99 [Conf]
  139. Stefano Rizzi, Elisa Bertino, Barbara Catania, Matteo Golfarelli, Maria Halkidi, Manolis Terrovitis, Panos Vassiliadis, Michalis Vazirgiannis, Euripides Vrachnos
    Towards a Logical Model for Patterns. [Citation Graph (0, 0)][DBLP]
    ER, 2003, pp:77-90 [Conf]
  140. Elisa Bertino, Elena Ferrari, Andrea Perego
    An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration. [Citation Graph (0, 0)][DBLP]
    ECDL, 2002, pp:656-657 [Conf]
  141. Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
    An Authorization Model and Its Formal Semantics. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:127-142 [Conf]
  142. Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza
    Signature and Access Control Policies for XML Documents. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:1-22 [Conf]
  143. Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini
    Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:359-373 [Conf]
  144. Elisa Bertino, Giovanna Guerrini, Danilo Montesi
    Inheritance in a Deductive Object Database Language with Updates. [Citation Graph (0, 0)][DBLP]
    FMLDO, 1999, pp:42-64 [Conf]
  145. Elisa Bertino, Giovanna Guerrini, Danilo Montesi
    Inheritance in a Deductive Object Database Language with Updates. [Citation Graph (0, 0)][DBLP]
    FMLDO - Selected Papers, 1999, pp:67-90 [Conf]
  146. Elisa Bertino, Ji-Won Byun, Ninghui Li
    Privacy-Preserving Database Systems. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:178-206 [Conf]
  147. Elisa Bertino, Elena Camossi, Giovanna Guerrini
    Access to Multigranular Temporal Objects. [Citation Graph (0, 0)][DBLP]
    FQAS, 2004, pp:320-333 [Conf]
  148. Elisa Bertino, Anna Cinzia Squicciarini
    A Flexible Access Control Model for Web Services. [Citation Graph (0, 0)][DBLP]
    FQAS, 2004, pp:13-16 [Conf]
  149. Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari
    Towards Supporting Fine-Grained Access Control for Grid Resources. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:59-65 [Conf]
  150. Elisa Bertino, Maria Damiani, Paolo Randi
    Multimedia Data Handling in a Knowledge Representation System. [Citation Graph (0, 0)][DBLP]
    Future Databases, 1992, pp:133-141 [Conf]
  151. Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita
    An authorization model for geographical maps. [Citation Graph (0, 0)][DBLP]
    GIS, 2004, pp:82-91 [Conf]
  152. Alberto Belussi, Elisa Bertino, Andrea Nucita
    Grid based methods for estimating spatial join selectivity. [Citation Graph (0, 0)][DBLP]
    GIS, 2004, pp:92-100 [Conf]
  153. Alberto Belussi, Barbara Catania, Elisa Bertino
    A reference framework for integrating multiple representations of geographical maps. [Citation Graph (0, 0)][DBLP]
    GIS, 2003, pp:33-40 [Conf]
  154. Elena Camossi, Michela Bertolotto, Elisa Bertino, Giovanna Guerrini
    A multigranular spatiotemporal data model. [Citation Graph (0, 0)][DBLP]
    GIS, 2003, pp:94-101 [Conf]
  155. Elisa Bertino
    Method precomputation in object-oriented databases. [Citation Graph (0, 0)][DBLP]
    COOCS, 1991, pp:199-212 [Conf]
  156. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray
    Trust Negotiations with Customizable Anonymity. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:69-72 [Conf]
  157. Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elena Ferrari
    An Update Protocol for XML Documents in Distributed and Cooperative Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:314-323 [Conf]
  158. Elisa Bertino, Barbara Catania, Boris Chidlovskii
    Indexing Constraint Databases by Using a Dual Representation. [Citation Graph (0, 15)][DBLP]
    ICDE, 1999, pp:618-627 [Conf]
  159. Elisa Bertino, Barbara Catania, Wen Qiang Wang
    XJoin Index: Indexing XML Data for Efficient Handling of Branching Path Expressions. [Citation Graph (0, 0)][DBLP]
    ICDE, 2004, pp:828- [Conf]
  160. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng
    Privacy and Ownership Preserving of Outsourced Medical Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:521-532 [Conf]
  161. Barbara Carminati, Elena Ferrari, Elisa Bertino
    Assuring Security Properties in Third-party Architectures. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:547-548 [Conf]
  162. Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor
    Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:119- [Conf]
  163. Alberto Trombetta, Elisa Bertino
    Private Updates to Anonymous Databases. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:116- [Conf]
  164. Elisa Bertino, Bill Black, Andrew Brasher, Vito Candela, Barbara Catania, Diana Deavin, Luigi Di Pace, Floriana Esposito, Pietro Leo, John McNaught, Andreas Persidis, Fabio Rinaldi, Giovanni Semeraro, Gian Piero Zarri
    CONCERTO, Conceptual Indexing, Querying and Retrieval of Digital Documents. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:1106-1109 [Conf]
  165. Bruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino
    P-Hera: Scalable fine-grained access control for P2P infrastructures. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:585-591 [Conf]
  166. Elisa Bertino, Barbara Carminati, Elena Ferrari
    A Flexible Authentication Method for UDDI Registries. [Citation Graph (0, 0)][DBLP]
    ICWS, 2003, pp:218-226 [Conf]
  167. Rafae Bhatti, Elisa Bertino, Arif Ghafoor
    A Trust-based Context-Aware Access Control Model for Web-Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:184-191 [Conf]
  168. Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor
    Access Control in Dynamic XML-Based Web-Services with X-RBAC. [Citation Graph (0, 0)][DBLP]
    ICWS, 2003, pp:243-249 [Conf]
  169. Elisa Bertino, Jason Crampton, Federica Paci
    Access Control and Authorization Constraints for WS-BPEL. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:275-284 [Conf]
  170. Elisa Bertino, Danilo Montesi, Maria Bagnato, Peter A. Dearnley
    Rules Termination Analysis investigating the interaction between transactions and triggers. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2002, pp:285-294 [Conf]
  171. Elisa Bertino, Marco Mesiti, Munir Cochinwala
    A Trigger-Based Approach for Communication Personalization. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2004, pp:3-13 [Conf]
  172. Elisa Bertino, Danilo Montesi, Alberto Trombetta
    Fuzzy and Presentation Algebras for Web and Multimedia Data. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2000, pp:134-144 [Conf]
  173. Elisa Bertino, Elena Ferrari, Andrea Perego, Gian Piero Zarri
    An Integrated Approach to Rating and Filtering Web Content. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2005, pp:749-751 [Conf]
  174. Elisa Bertino, Sandro Bottarelli, Maria Damiani, M. Marcadella, M. Migliorati, Paolo Randi
    A Knowledge Based Information System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (3), 1992, pp:189-195 [Conf]
  175. Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino
    Hiding Association Rules by Using Confidence and Support. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:369-383 [Conf]
  176. B. Armani, Elisa Bertino, Barbara Catania, D. Laradi, B. Marin, Gian Piero Zarri
    Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2000, pp:68-76 [Conf]
  177. Elisa Bertino, Giovanna Guerrini, Marco Mesiti
    Matching an XML Document against a Set of DTDs. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2002, pp:412-422 [Conf]
  178. Elisa Bertino, Alessandra Mileo, Alessandro Provetti
    PDL with Maximum Consistency Monitors. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2003, pp:65-74 [Conf]
  179. Gian Piero Zarri, Elisa Bertino, Bill Black, Andrew Brasher, Barbara Catania, Diana Deavin, Luigi Di Pace, Floriana Esposito, Pietro Leo, John McNaught, Andreas Persidis, Fabio Rinaldi, Giovanni Semeraro
    CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents. [Citation Graph (0, 0)][DBLP]
    ISMIS, 1999, pp:226-234 [Conf]
  180. Elisa Bertino, Barbara Carminati, Elena Ferrari
    A Secure Publishing Service for Digital Libraries of XML Documents. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:347-362 [Conf]
  181. Elisa Bertino, Elena Ferrari, Giovanni Mella
    An XML-Based Approach to Document Flow Verification. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:207-218 [Conf]
  182. Elisa Bertino, Teodoro Leggieri, Evimaria Terzi
    Securing DBMS: Characterizing and Detecting Query Floods. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:195-206 [Conf]
  183. Elisa Bertino, Maria Luisa Damiani
    Spatial Knowledge-Based Applications and Technologies: Research Issues. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:324-328 [Conf]
  184. Maria Luisa Damiani, Elisa Bertino
    Access Control and Privacy in Location-Aware Services forMobile Organizations. [Citation Graph (0, 0)][DBLP]
    MDM, 2006, pp:11- [Conf]
  185. Elisa Bertino, Munir Cochinwala, Marco Mesiti
    UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2002, pp:8-0 [Conf]
  186. Stefano Valtolina, Stefano Franzoni, Pietro Mazzoleni, Elisa Bertino
    Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study. [Citation Graph (0, 0)][DBLP]
    MMM, 2005, pp:214-221 [Conf]
  187. Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
    Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:461-472 [Conf]
  188. Elisa Bertino, Barbara Catania
    Database Monitoring in U-Datalog. [Citation Graph (0, 0)][DBLP]
    NGITS, 1995, pp:0-0 [Conf]
  189. Elisa Bertino, Giovanna Guerrini, Danilo Montesi
    Generic Methods in Deductive Object Databases. [Citation Graph (0, 0)][DBLP]
    OOIS, 1994, pp:210-213 [Conf]
  190. Elisa Bertino, Giovanna Guerrini
    Extending the ODMG Object Model with Composite Objects. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1998, pp:259-270 [Conf]
  191. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:96-116 [Conf]
  192. Elisa Bertino, Pierangela Samarati
    Research Issues in Discretionary Authorizations for Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:183-199 [Conf]
  193. Elisa Bertino, Barbara Catania, Anna Maddalena
    Towards a Language for Pattern Manipulation and Querying. [Citation Graph (0, 0)][DBLP]
    PaRMa, 2004, pp:- [Conf]
  194. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
    Privacy-Preserving Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:283-301 [Conf]
  195. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino
    Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:78-98 [Conf]
  196. Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar
    Preserving User Location Privacy in Mobile Data Management Infrastructures. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:393-412 [Conf]
  197. Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari
    Anonymity Preserving Techniques in Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:93-109 [Conf]
  198. Barbara Catania, Anna Maddalena, Maurizio Mazza, Elisa Bertino, Stefano Rizzi
    A Framework for Data Mining Pattern Management. [Citation Graph (0, 0)][DBLP]
    PKDD, 2004, pp:87-98 [Conf]
  199. Elisa Bertino, Barbara Catania, Eleonora Caglio
    Applying Data Mining Techniques to Wafer Manufacturing. [Citation Graph (0, 0)][DBLP]
    PKDD, 1999, pp:41-50 [Conf]
  200. Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
    A System to Specify and Manage Multipolicy Access Control Models. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:116-127 [Conf]
  201. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
    X-TNL: An XML-based Language for Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:81-84 [Conf]
  202. Elisa Bertino, Alessandra Mileo, Alessandro Provetti
    PDL with Preferences. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:213-222 [Conf]
  203. Babak Sadighi Firozabadi, Marek J. Sergot, Anna Cinzia Squicciarini, Elisa Bertino
    A Framework for Contractual Resource Sharing in Coalitions. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:117-126 [Conf]
  204. Elisa Bertino, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
    Policy Languages for Digital Identity Management in Federation Systems. [Citation Graph (0, 0)][DBLP]
    POLICY, 2006, pp:54-66 [Conf]
  205. Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino
    Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2006, pp:217-232 [Conf]
  206. Elisa Bertino, Piero A. Bonatti, Elena Ferrari
    TRBAC: a temporal role-based access control model. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:21-30 [Conf]
  207. Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
    A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:1-12 [Conf]
  208. Elisa Bertino
    Query Decomposition in an Object-Oriented Database System Distributed on a Local Area Network. [Citation Graph (0, 0)][DBLP]
    RIDE-DOM, 1995, pp:2-9 [Conf]
  209. Elisa Bertino, Maria Luisa Damiani, Davide Momini
    An Access Control System for a Web Map Management Service. [Citation Graph (0, 0)][DBLP]
    RIDE, 2004, pp:33-39 [Conf]
  210. Elisa Bertino, Maria Damiani, Paolo Randi, Luca Spampinato
    An Advanced Information Management System. [Citation Graph (0, 0)][DBLP]
    RIDE-IMS, 1993, pp:61-64 [Conf]
  211. Elisa Bertino, Elena Ferrari, Evaggelia Pitoura
    An Access Control Mechanism for Large Scale Data Dissemination Systems. [Citation Graph (0, 6)][DBLP]
    RIDE-DM, 2001, pp:43-50 [Conf]
  212. Maria Luisa Damiani, Elisa Bertino
    Architectural issues for a location-aware role-based access control system. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1184-1185 [Conf]
  213. Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia
    Decentralized authorization and data security in web content delivery. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1654-1661 [Conf]
  214. Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca
    GEO-RBAC: a spatially aware RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:29-37 [Conf]
  215. Elisa Bertino, Silvana Castano, Elena Ferrari
    On specifying security policies for web documents with an XML-based language. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:57-65 [Conf]
  216. Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
    A logical framework for reasoning about access control models. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:41-52 [Conf]
  217. Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu
    Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:125- [Conf]
  218. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
    Making access control more usable. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:141- [Conf]
  219. Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari
    An infrastructure for managing secure update operations on XML data. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:110-122 [Conf]
  220. Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor
    X-GTRBAC admin: a decentralized administration model for enterprise wide access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:78-86 [Conf]
  221. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
    Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:53- [Conf]
  222. Ji-Won Byun, Elisa Bertino, Ninghui Li
    Purpose based access control of complex data for privacy protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:102-110 [Conf]
  223. Ji-Won Byun, Yonglak Sohn, Elisa Bertino
    Systematic control and management of data integrity. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:101-110 [Conf]
  224. Mohamed Shehab, Elisa Bertino, Arif Ghafoor
    SERAT: SEcure role mApping technique for decentralized secure interoperability. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:159-167 [Conf]
  225. Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
    Access control, confidentiality and privacy for video surveillance databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:1-10 [Conf]
  226. James B. D. Joshi, Elisa Bertino
    Fine-grained role-based delegation in presence of the hybrid role hierarchy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:81-90 [Conf]
  227. James Joshi, Elisa Bertino, Arif Ghafoor
    Temporal hierarchies and inheritance semantics for GTRBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:74-83 [Conf]
  228. James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino
    Dependencies and separation of duty constraints in GTRBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:51-64 [Conf]
  229. Pietro Mazzoleni, Elisa Bertino, Bruno Crispo
    XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:219-227 [Conf]
  230. Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li
    Secure Anonymization for Incremental Datasets. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:48-63 [Conf]
  231. Ilaria Bartolini, Elisa Bertino, Barbara Catania, Paolo Ciaccia, Matteo Golfarelli, Marco Patella, Stefano Rizzi
    PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project. [Citation Graph (0, 0)][DBLP]
    SEBD, 2003, pp:293-300 [Conf]
  232. Elisa Bertino, Stefano Franzoni, Marco Mesiti
    Memorizzazione di regole per l'instradamento di messaggi in un sistema di comunicazione universale. [Citation Graph (0, 0)][DBLP]
    SEBD, 2003, pp:245-256 [Conf]
  233. Elisa Bertino, Giovanna Guerrini, Marco Mesiti
    Exploiting User-Profiles for the Selective Dissemination of XML Documents. [Citation Graph (0, 0)][DBLP]
    SEBD, 2004, pp:334-341 [Conf]
  234. Alberto Belussi, Elisa Bertino, Andrea Nucita
    Grid Based Methods for the Spatial Join Estimation. [Citation Graph (0, 0)][DBLP]
    SEBD, 2003, pp:49-60 [Conf]
  235. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:271-280 [Conf]
  236. Pietro Mazzoleni, Stefano Valtolina, Stefano Franzoni, Piero Mussio, Elisa Bertino
    Towards a contextualized access to the cultural heritage world using 360 Panoramic Images. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:416-419 [Conf]
  237. Pietro Mazzoleni, Elisa Bertino, Stefano Valtolina, Elena Ferrari, C. Boeri
    ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage. [Citation Graph (0, 0)][DBLP]
    SIGGRAPH, 2003, pp:- [Conf]
  238. Elisa Bertino, Silvana Castano, Elena Ferrari
    Securing XML Documents: the Author-X Project Demonstration. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2001, pp:605- [Conf]
  239. Elisa Bertino, Donatella Castelli, Federica Vitale
    A Formal Representation for State Diagrams in the OMT Methodology. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 1996, pp:327-334 [Conf]
  240. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf]
  241. Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf]
  242. Costantino Thanos, Carlo Carlesi, Elisa Bertino
    Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliability in Distributed Software and Database Systems, 1983, pp:57-69 [Conf]
  243. Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena
    Modeling and Language Support for the Management of Pattern-Bases. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2004, pp:265-274 [Conf]
  244. Elisa Bertino, Tsz S. Cheng, Shashi K. Gadia, Giovanna Guerrini
    A Linguistic Framework for Querying Dimensional Data. [Citation Graph (0, 0)][DBLP]
    TIME, 2001, pp:156-163 [Conf]
  245. Elisa Bertino, Elena Ferrari, Giovanna Guerrini, Isabella Merlo
    Navigating Through Multiple Temporal Granularity Objects. [Citation Graph (0, 0)][DBLP]
    TIME, 2001, pp:147-155 [Conf]
  246. Elena Camossi, Elisa Bertino, Giovanna Guerrini, Marco Mesiti
    Evolution Specification of Multigranular Temporal Objects. [Citation Graph (0, 0)][DBLP]
    TIME, 2002, pp:78-85 [Conf]
  247. Isabella Merlo, Elisa Bertino, Elena Ferrari, Giovanna Guerrini
    A Temporal Object-Oriented Data Model with Multiple Granularities. [Citation Graph (0, 0)][DBLP]
    TIME, 1999, pp:73-81 [Conf]
  248. Isabella Merlo, Elisa Bertino, Elena Ferrari, Shashi K. Gadia, Giovanna Guerrini
    Querying Multiple Temporal Granularity Data. [Citation Graph (0, 0)][DBLP]
    TIME, 2000, pp:103-114 [Conf]
  249. Elisa Bertino, Alessandro Provetti, Franco Salvetti
    Reasoning about RDF statements with default rules. [Citation Graph (0, 0)][DBLP]
    Rule Languages for Interoperability, 2005, pp:- [Conf]
  250. Elisa Bertino, Barbara Catania, Gian Piero Zarri
    A Conceptual Annotation Approach to Indexing in a Web-Based Information System. [Citation Graph (0, 0)][DBLP]
    WECWIS, 1999, pp:160-165 [Conf]
  251. Bhavani M. Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari
    Directions for Web and E-Commerce Applications Security. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:200-204 [Conf]
  252. Elisa Bertino, Silvana Castano, Elena Ferrari, Marco Mesiti
    Controlled Access and Dissemination of XML Documents. [Citation Graph (0, 5)][DBLP]
    Workshop on Web Information and Data Management, 1999, pp:22-27 [Conf]
  253. Massimo Mecella, Mourad Ouzzani, Federica Paci, Elisa Bertino
    Access control enforcement for conversation-based web services. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:257-266 [Conf]
  254. Sunil Choenni, Elisa Bertino, Henk M. Blanken, Thiel Chang
    Index Configurations in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    TOOLS (13), 1994, pp:119-133 [Conf]
  255. Elisa Bertino, Giovanna Guerrini, Isabella Merlo
    Triggers in Java-based Databases. [Citation Graph (0, 0)][DBLP]
    L'OBJET, 2000, v:6, n:3, pp:- [Journal]
  256. Elisa Bertino, Daniela Musto
    Correctness of Semantic Integrity Checking in Database Management Systems. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1988, v:26, n:1/2, pp:25-57 [Journal]
  257. Frédéric Cuppens, Hervé Debar, Elisa Bertino
    Foreword. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:242-244 [Journal]
  258. Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati
    Protecting information on the Web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:11es, pp:3- [Journal]
  259. Rafae Bhatti, Elisa Bertino, Arif Ghafoor
    An integrated approach to federated identity and privilege management in open systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:2, pp:81-87 [Journal]
  260. Elisa Bertino
    An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1987, v:30, n:6, pp:519-528 [Journal]
  261. Elisa Bertino
    RBAC models - concepts and trends. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:511-514 [Journal]
  262. Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi
    XML-Based Specification for Web Services Document Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:41-49 [Journal]
  263. Elisa Bertino, Giovanna Guerrini, Isabella Merlo
    A set-oriented method definition language for object databases and its semantics. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2003, v:15, n:14, pp:1275-1335 [Journal]
  264. Elisa Bertino, Barbara Catania, Roberta Gori
    Enhancing the expressive power of the U-Datalog language [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  265. Elisa Bertino, Barbara Catania, Paolo Perlasca
    Introducing Dynamic Behavior in Amalgamated Knowledge Bases [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  266. Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza
    A Framework for Evaluating Privacy Preserving Data Mining Algorithms. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:2, pp:121-154 [Journal]
  267. Elisa Bertino, Fausto Rabitti
    Query Processing Based on Complex Object Types. [Citation Graph (0, 0)][DBLP]
    IEEE Database Eng. Bull., 1986, v:9, n:4, pp:22-29 [Journal]
  268. Elisa Bertino, Hans Weigand
    An Approach to Authorization Modeling in Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1994, v:12, n:1, pp:1-29 [Journal]
  269. Elisa Bertino
    Data Security. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1998, v:25, n:1-2, pp:199-216 [Journal]
  270. Elisa Bertino, Silvana Castano, Elena Ferrari, Marco Mesiti
    Protection and administration of XML data sources. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:237-260 [Journal]
  271. Alberto Belussi, Elisa Bertino, Barbara Catania
    Using spatial data access structures for filtering nearest neighbor queries. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:40, n:1, pp:1-31 [Journal]
  272. Yong-Moo Kwon, Elena Ferrari, Elisa Bertino
    Modeling Spatio-Temporal Constraints for Multimedia Objects. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1999, v:30, n:3, pp:217-238 [Journal]
  273. Athena Vakali, Evimaria Terzi, Elisa Bertino, Ahmed K. Elmagarmid
    Hierarchical data placement for navigational multimedia applications. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2003, v:44, n:1, pp:49-80 [Journal]
  274. Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, Stefano Rizzi
    Modeling and language support for the management of pattern-bases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2007, v:62, n:2, pp:368-397 [Journal]
  275. Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella
    Applications of Object-Oriented Technology to the Integration of Heterogeneous Database Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 1994, v:2, n:4, pp:343-370 [Journal]
  276. Elisa Bertino, M. Tamer Özsu
    Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 1994, v:2, n:1, pp:5-6 [Journal]
  277. Elisa Bertino, Alberto Trombetta, Danilo Montesi
    Workflow Architecture for Interactive Video Management Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2002, v:11, n:1, pp:33-51 [Journal]
  278. Rafae Bhatti, Elisa Bertino, Arif Ghafoor
    A Trust-Based Context-Aware Access Control Model for Web-Services. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2005, v:18, n:1, pp:83-105 [Journal]
  279. Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino
    Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal]
  280. Elisa Bertino
    Review - Supporting Valid-Time Indeterminacy. [Citation Graph (0, 1)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  281. Elisa Bertino
    Review - Data Mining: An Overview from a Database Perspective. [Citation Graph (0, 1)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  282. Elisa Bertino
    Review - Role Hierarchies and Constraints for Lattice-Based Access Controls. [Citation Graph (0, 1)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  283. Elisa Bertino
    Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels. [Citation Graph (0, 1)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  284. Elisa Bertino
    Review - An Authorization Mechanism for a Relational Data Base System. [Citation Graph (0, 2)][DBLP]
    ACM SIGMOD Digital Review, 1999, v:1, n:, pp:- [Journal]
  285. Elisa Bertino, Athman Bouguettaya
    IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2002, v:3, n:7, pp:- [Journal]
  286. Elisa Bertino, Barbara Catania, Gian Piero Zarri
    Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2001, v:47, n:1-2, pp:155-173 [Journal]
  287. Elena Camossi, Michela Bertolotto, Elisa Bertino
    A multigranular object-oriented framework supporting spatio-temporal granularity conversions. [Citation Graph (0, 0)][DBLP]
    International Journal of Geographical Information Science, 2006, v:20, n:5, pp:511-534 [Journal]
  288. Elisa Bertino, Tiziana Catarci, Ahmed K. Elmagarmid, Mohand-Said Hacid
    Quality of Service Specification in Video Databases. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2003, v:10, n:4, pp:71-81 [Journal]
  289. Elisa Bertino, Elena Ferrari, Andrea Perego
    Content-based filtering of Web documents: the MaX system and the EUFORBIA project. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:45-58 [Journal]
  290. Elisa Bertino, Pietro Mazzoleni, D. Santi
    Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2004, v:14, n:6, pp:545-564 [Journal]
  291. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    A theoretical formulation for degrees of isolation in databases. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1997, v:39, n:1, pp:47-53 [Journal]
  292. Elisa Bertino, Athman Bouguettaya
    Guest Editors' Introduction: Database Technology on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:4, pp:31-32 [Journal]
  293. Elisa Bertino, Barbara Catania
    Integrating XML and Databases. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:4, pp:84-88 [Journal]
  294. Elisa Bertino, Elena Ferrari
    XML and Data Integration. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:6, pp:75-76 [Journal]
  295. Elisa Bertino, Silvana Castano, Elena Ferrari
    Securing XML Documents with Author-X. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:3, pp:21-0 [Journal]
  296. Elisa Bertino, Krithi Ramamritham
    Guest Editors' Introduction: Data Dissemination on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:3, pp:27-28 [Journal]
  297. Elisa Bertino, Steve Ruth
    Policies and IT Technologies: A Puzzle of Two Pieces. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2006, v:10, n:1, pp:65-67 [Journal]
  298. James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor
    Access-Control Language for Multidomain Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:6, pp:40-50 [Journal]
  299. Elisa Bertino, Barbara Catania, Limsoon Wong
    Finitely Representable Nested Relations. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:4, pp:165-173 [Journal]
  300. Boris Shidlovsky, Elisa Bertino
    On the Number of Descendants in an Object DAG. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:58, n:5, pp:211-216 [Journal]
  301. Elisa Bertino, Barbara Catania, Luca Chiesa
    Definition and Analysis of Index Organizations for Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1998, v:23, n:2, pp:65-108 [Journal]
  302. Elisa Bertino, Elena Ferrari, Giovanna Guerrini, Isabella Merlo
    T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2003, v:28, n:8, pp:885-927 [Journal]
  303. Elisa Bertino, Giovanna Guerrini, Marco Mesiti
    A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2004, v:29, n:1, pp:23-46 [Journal]
  304. Danilo Montesi, Elisa Bertino, Maria Bagnato
    Refined rules termination analysis through transactions. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2003, v:28, n:5, pp:435-456 [Journal]
  305. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:4, pp:311-352 [Journal]
  306. Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
    A Semantic-Based Execution Model for Multilevel Secure Workflows. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
  307. Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo
    A Logic-Based Approach for Enforcing Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  308. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Temporal Authorization Bases: From Specification to Integration. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal]
  309. Elisa Bertino, Elena Ferrari
    Secure Object Deletion and Garbage Collection in Multilevel Object Bases. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal]
  310. Elisa Bertino, Elena Ferrari, Giovanni Mella
    An approach to cooperative updates of XML documents in distributed systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:2, pp:191-242 [Journal]
  311. Elisa Bertino, Fabio Origgi, Pierangela Samarati
    An Extended Authorization Model for Object Databases. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:2/3, pp:169-206 [Journal]
  312. Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino
    Establishing and protecting digital identity in federation systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:3, pp:269-300 [Journal]
  313. Elisa Bertino, Mohand-Said Hacid, Farouk Toumani
    Towards structure discovering in video data. [Citation Graph (0, 0)][DBLP]
    J. Exp. Theor. Artif. Intell., 2005, v:17, n:1-2, pp:5-18 [Journal]
  314. Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid
    A Knowledge-Based Approach to Visual Information. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2002, v:19, n:3, pp:319-341 [Journal]
  315. Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid
    Ordering and Path Constraints over Semistructured Data. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2003, v:20, n:2, pp:181-206 [Journal]
  316. Elisa Bertino, Barbara Catania, Vincenzo Gervasi, Alessandra Raffaetà
    A Logical Approach to Cooperative Information Systems. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 2000, v:43, n:1, pp:15-48 [Journal]
  317. Elisa Bertino, Barbara Carminati, Elena Ferrari
    Merkle Tree Authentication in UDDI Registries. [Citation Graph (0, 0)][DBLP]
    Int. J. Web Service Res., 2004, v:1, n:2, pp:37-57 [Journal]
  318. Elena Camossi, Elisa Bertino, Marco Mesiti, Giovanna Guerrini
    Handling Expiration of Multigranular Temporal Objects. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2004, v:14, n:1, pp:23-50 [Journal]
  319. Elisa Bertino, Barbara Catania
    A Constraint-Based Approach to Shape Management in Multimedia Databases. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 1998, v:6, n:1, pp:2-16 [Journal]
  320. Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid
    A Logical Approach to Quality of Service Specification in Video Databases. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2004, v:23, n:2, pp:75-101 [Journal]
  321. Philip A. Bernstein, Elisa Bertino, Andreas Heuer, Christian S. Jensen, Holger Meyer, M. Tamer Özsu, Richard T. Snodgrass, Kyu-Young Whang
    An apples-to-apples comparison of two database journals. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:4, pp:61-64 [Journal]
  322. Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid
    Quality of Service in Multimedia Digital Libraries. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:1, pp:35-40 [Journal]
  323. Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid
    A Database Approach to Quality of Service Specification in Video Databases. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:1, pp:35-40 [Journal]
  324. Ji-Won Byun, Elisa Bertino
    Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:1, pp:9-13 [Journal]
  325. Pietro Mazzoleni, Elisa Bertino, Elena Ferrari, Stefano Valtolina
    CiVeDi: A Customized Virtual Environment for Database Interaction. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:3, pp:15-20 [Journal]
  326. Mourad Ouzzani, Walid G. Aref, Elisa Bertino, Ann Christine Catlin, Christopher W. Clifton, Wing-Kai Hon, Ahmed K. Elmagarmid, Arif Ghafoor, Susanne E. Hambrusch, Sunil Prabhakar, Jeffrey Scott Vitter, Xiang Zhang
    The Indiana Center for Database Systems at Purdue University. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:2, pp:53-58 [Journal]
  327. Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yücel Saygin, Yannis Theodoridis
    State-of-the-art in privacy preserving data mining. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:1, pp:50-57 [Journal]
  328. Elisa Bertino, Barbara Catania, A. Filippone
    An index allocation tool for object-oriented database systems. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2000, v:30, n:9, pp:973-1002 [Journal]
  329. Elisa Bertino, Elena Ferrari, Pierangela Samarati
    Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1998, v:4, n:3, pp:183-204 [Journal]
  330. Elisa Bertino, Susan Darling Urban, Elke A. Rundensteiner
    Object-Oriented Databases and Applications - Selected Papers from ICDE'98. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1999, v:5, n:3, pp:125- [Journal]
  331. Giovanna Guerrini, Elisa Bertino, Barbara Catania, Jesús García Molina
    A Formal View of Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1997, v:3, n:3, pp:157-183 [Journal]
  332. Elisa Bertino, Ravi S. Sandhu
    Database Security-Concepts, Approaches, and Challenges. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:2-19 [Journal]
  333. James Joshi, Elisa Bertino, Arif Ghafoor
    An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:157-175 [Journal]
  334. Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray
    Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:13-30 [Journal]
  335. Elisa Bertino, Piero A. Bonatti, Elena Ferrari
    TRBAC: A temporal role-based access control model. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:191-233 [Journal]
  336. Elisa Bertino, Barbara Catania, Elena Ferrari
    A nested transaction model for multilevel secure database management systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:321-370 [Journal]
  337. Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
    A logical framework for reasoning about access control models. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:71-127 [Journal]
  338. Elisa Bertino, Elena Ferrari
    Secure and selective dissemination of XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:290-331 [Journal]
  339. Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
    The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:65-104 [Journal]
  340. Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati
    Exception-Based Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:26-65 [Journal]
  341. Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi
    X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:187-227 [Journal]
  342. Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi
    X-gtrbac admin: A decentralized administration model for enterprise-wide access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:388-423 [Journal]
  343. Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin
    Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:421-460 [Journal]
  344. Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca
    GEO-RBAC: A spatially aware RBAC. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:1, pp:- [Journal]
  345. Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari
    A Content-Based Authorization Model for Digital Libraries. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:296-315 [Journal]
  346. Alberto Belussi, Elisa Bertino, Barbara Catania
    An Extended Algebra for Constraint Databases. [Citation Graph (0, 36)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:5, pp:686-705 [Journal]
  347. Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
    Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. [Citation Graph (0, 22)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:697-708 [Journal]
  348. Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, Amar Gupta
    Selective and Authentic Third-Party Distribution of XML Documents. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1263-1278 [Journal]
  349. Elisa Bertino, Elena Ferrari, Giovanna Guerrini
    Navigational Accesses in a Temporal Object Model. [Citation Graph (0, 7)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:4, pp:656-665 [Journal]
  350. Elisa Bertino, Elena Ferrari, Marco Stolf
    Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2001, v:13, n:2, pp:334- [Journal]
  351. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
    Trust-X: A Peer-to-Peer Framework for Trust Establishment. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:7, pp:827-842 [Journal]
  352. Elisa Bertino, Giovanna Guerrini, Isabella Merlo
    Trigger Inheritance and Overriding in an Active Object Database System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:4, pp:588-608 [Journal]
  353. Elisa Bertino, Giovanna Guerrini, Isabella Merlo
    Extending the ODMG Object Model with Triggers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:2, pp:170-188 [Journal]
  354. Elisa Bertino, Richard R. Muntz, Thomas C. Rakow
    Guest Editorial: Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:58-59 [Journal]
  355. Elisa Bertino, Beng Chin Ooi
    The Indispensability of Dispensable Indexes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1999, v:11, n:1, pp:17-27 [Journal]
  356. Elisa Bertino, Susan Darling Urban
    Guest Editorial: Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:1-2 [Journal]
  357. Barbara Catania, Elisa Bertino
    Static Analysis of Logical Languages with Deferred Update Semantics. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:2, pp:386-404 [Journal]
  358. James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor
    A Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:1, pp:4-23 [Journal]
  359. Danilo Montesi, Elisa Bertino, Maurizio Martelli
    Transactions and Updates in Deductive Databases. [Citation Graph (0, 28)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:784-797 [Journal]
  360. Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino
    ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal]
  361. Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia
    Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:524-538 [Journal]
  362. Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor
    Secure Interoperation in a Multidomain Environment Employing RBAC Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:11, pp:1557-1577 [Journal]
  363. Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino, Yücel Saygin, Elena Dasseni
    Association Rule Hiding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:4, pp:434-447 [Journal]
  364. Elisa Bertino, Jianping Fan, Elena Ferrari, Mohand-Said Hacid, Ahmed K. Elmagarmid, Xingquan Zhu
    A hierarchical access control model for video database systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 2003, v:21, n:2, pp:155-191 [Journal]
  365. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Flexible Authorization Mechanism for Relational Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 1999, v:17, n:2, pp:101-140 [Journal]
  366. Elisa Bertino, Barbara Catania, Roberta Gori
    Enhancing the expressive power of the U-Datalog language. [Citation Graph (0, 0)][DBLP]
    TPLP, 2001, v:1, n:1, pp:105-122 [Journal]
  367. Elisa Bertino, Barbara Catania, Paolo Perlasca
    Introducing Dynamic Behavior in Amalgamated Knowledge Bases. [Citation Graph (0, 0)][DBLP]
    TPLP, 2003, v:3, n:6, pp:625-669 [Journal]
  368. Rafae Bhatti, Elisa Bertino, Arif Ghafoor
    X-FEDERATE: A Policy Engineering Framework for Federated Access Management. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:5, pp:330-346 [Journal]
  369. Elisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham
    Secure knowledge management: confidentiality, trust, and privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:429-438 [Journal]
  370. Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo
    An authorization system for digital libraries. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2002, v:11, n:1, pp:58-67 [Journal]
  371. Elisa Bertino, Silvana Castano, Elena Ferrari, Marco Mesiti
    Specifying and enforcing access control policies for XML document sources. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2000, v:3, n:3, pp:139-151 [Journal]
  372. Elisa Bertino, Tok Wang Ling, Umeshwar Dayal
    Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2004, v:7, n:1, pp:5-6 [Journal]
  373. Elisa Bertino, Anna Cinzia Squicciarini, Ivan Paloscia, Lorenzo Martino
    Ws-AC: A Fine Grained Access Control System for Web Services. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2006, v:9, n:2, pp:143-171 [Journal]
  374. Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li
    Efficient k -Anonymization Using Clustering Techniques. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2007, pp:188-200 [Conf]
  375. Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng Chin Ooi
    Data Management in RFID Applications. [Citation Graph (0, 0)][DBLP]
    DEXA, 2007, pp:434-444 [Conf]
  376. Ashish Kundu, Elisa Bertino
    Secure Dissemination of XML Content Using Structure-based Routing. [Citation Graph (0, 0)][DBLP]
    EDOC, 2006, pp:153-164 [Conf]
  377. Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
    Conditional Privacy-Aware Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:72-89 [Conf]
  378. Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino
    Privacy Requirements in Identity Management Solutions. [Citation Graph (0, 0)][DBLP]
    HCI (9), 2007, pp:694-702 [Conf]
  379. Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino
    Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:57- [Conf]
  380. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis
    Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:386-397 [Conf]
  381. Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster
    User Tasks and Access Control overWeb Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:60-69 [Conf]
  382. Rafae Bhatti, Daniel Sanz, Elisa Bertino, Arif Ghafoor
    A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:447-454 [Conf]
  383. Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino
    Managing Risks in RBAC Employed Distributed Environments. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1548-1566 [Conf]
  384. Prathima Rao, Dan Lin, Elisa Bertino
    XACML Function Annotations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:178-182 [Conf]
  385. Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo
    An approach to evaluate policy similarity. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:1-10 [Conf]
  386. Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo
    Privacy-aware role based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:41-50 [Conf]
  387. Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin
    A privacy preserving assertion based policy language for federation systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:51-60 [Conf]
  388. Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid
    Privacy preserving schema and data matching. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:653-664 [Conf]
  389. Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun
    On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:555-566 [Conf]
  390. Marco Mesiti, Elisa Bertino, Giovanna Guerrini
    An abstraction-based approach to measuring the structural similarity between two unordered XML documents. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:316-321 [Conf]
  391. Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu
    A roadmap for comprehensive online privacy policy management. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:7, pp:109-116 [Journal]
  392. Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza
    A system for securing push-based distribution of XML documents. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:255-284 [Journal]
  393. Xiaoxin Wu, Elisa Bertino
    An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:252-265 [Journal]
  394. Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham
    PP-trust-X: A system for privacy preserving trust negotiations. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]
  395. Ashish Kamra, Evimaria Terzi, Elisa Bertino
    Detecting anomalous access patterns in relational databases. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  396. Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. [Citation Graph (, )][DBLP]


  397. Location-Aware Authentication and Access Control. [Citation Graph (, )][DBLP]


  398. High-Assurance Integrity Techniques for Databases. [Citation Graph (, )][DBLP]


  399. D-algebra for composing access control policy decisions. [Citation Graph (, )][DBLP]


  400. Physically restricted authentication with trusted hardware. [Citation Graph (, )][DBLP]


  401. Risk-based access control systems built on fuzzy inferences. [Citation Graph (, )][DBLP]


  402. Controlling data disclosure in computational PIR protocols. [Citation Graph (, )][DBLP]


  403. The Challenge of Assuring Data Trustworthiness. [Citation Graph (, )][DBLP]


  404. Querying Multigranular Spatio-temporal Objects. [Citation Graph (, )][DBLP]


  405. Publishing Time-Series Data under Preservation of Privacy and Distance Orders. [Citation Graph (, )][DBLP]


  406. A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations. [Citation Graph (, )][DBLP]


  407. Password policy simulation and analysis. [Citation Graph (, )][DBLP]


  408. Receipt management- transaction history based trust establishment. [Citation Graph (, )][DBLP]


  409. Identity-based long running negotiations. [Citation Graph (, )][DBLP]


  410. Minimal credential disclosure in trust negotiations. [Citation Graph (, )][DBLP]


  411. Self-tuning query mesh for adaptive multi-route query processing. [Citation Graph (, )][DBLP]


  412. How to authenticate graphs without leaking. [Citation Graph (, )][DBLP]


  413. Private record matching using differential privacy. [Citation Graph (, )][DBLP]


  414. Multigranular spatio-temporal models: implementation challenges. [Citation Graph (, )][DBLP]


  415. Security and privacy for geospatial data: concepts and research directions. [Citation Graph (, )][DBLP]


  416. Position transformation: a location privacy protection method for moving objects. [Citation Graph (, )][DBLP]


  417. Preventing velocity-based linkage attacks in location-aware applications. [Citation Graph (, )][DBLP]


  418. Assessing the trustworthiness of location data based on provenance. [Citation Graph (, )][DBLP]


  419. The Design and Evaluation of Accountable Grid Computing System. [Citation Graph (, )][DBLP]


  420. Continuous Intersection Joins Over Moving Objects. [Citation Graph (, )][DBLP]


  421. Privately Updating Suppression and Generalization based k-Anonymous Databases. [Citation Graph (, )][DBLP]


  422. A Hybrid Approach to Private Record Linkage. [Citation Graph (, )][DBLP]


  423. A Security Punctuation Framework for Enforcing Access Control on Streaming Data. [Citation Graph (, )][DBLP]


  424. Protecting Databases from Query Flood Attacks. [Citation Graph (, )][DBLP]


  425. Secure Delta-Publishing of XML Content. [Citation Graph (, )][DBLP]


  426. Trust establishment in the formation of Virtual Organizations. [Citation Graph (, )][DBLP]


  427. Using Anonymized Data for Classification. [Citation Graph (, )][DBLP]


  428. A privacy-preserving approach to policy-based content dissemination. [Citation Graph (, )][DBLP]


  429. FENCE: Continuous access control enforcement in dynamic data stream environments. [Citation Graph (, )][DBLP]


  430. Credibility-enhanced curated database: Improving the value of curated databases. [Citation Graph (, )][DBLP]


  431. A Comprehensive Approach for Solving Policy Heterogeneity. [Citation Graph (, )][DBLP]


  432. A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations. [Citation Graph (, )][DBLP]


  433. Privacy Preserving OLAP over Distributed XML Documents. [Citation Graph (, )][DBLP]


  434. Authorization and User Failure Resiliency for WS-BPEL Business Processes. [Citation Graph (, )][DBLP]


  435. The SCIFC Model for Information Flow Control in Web Service Composition. [Citation Graph (, )][DBLP]


  436. Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. [Citation Graph (, )][DBLP]


  437. Policy-Driven Service Composition with Information Flow Control. [Citation Graph (, )][DBLP]


  438. A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. [Citation Graph (, )][DBLP]


  439. P-CDN: Extending access control capabilities of P2P systems to provide CDN services. [Citation Graph (, )][DBLP]


  440. VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. [Citation Graph (, )][DBLP]


  441. Interactive Location Cloaking with the PROBE Obfuscator. [Citation Graph (, )][DBLP]


  442. Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  443. Proactive Role Discovery in Mediator-Free Environments. [Citation Graph (, )][DBLP]


  444. Automatic Compliance of Privacy Policies in Federated Digital Identity Management. [Citation Graph (, )][DBLP]


  445. EXAM: An Environment for Access Control Policy Analysis and Management. [Citation Graph (, )][DBLP]


  446. Visualization for Access Control Policy Analysis Results Using Multi-level Grids. [Citation Graph (, )][DBLP]


  447. Digital identity management and protection. [Citation Graph (, )][DBLP]


  448. Database Intrusion Detection and Response. [Citation Graph (, )][DBLP]


  449. Privilege States Based Access Control for Fine-Grained Intrusion Response. [Citation Graph (, )][DBLP]


  450. A secure multiparty computation privacy preserving OLAP framework over distributed XML data. [Citation Graph (, )][DBLP]


  451. An obligation model bridging access control policies and privacy policies. [Citation Graph (, )][DBLP]


  452. Policy decomposition for collaborative access control. [Citation Graph (, )][DBLP]


  453. Mining roles with semantic meanings. [Citation Graph (, )][DBLP]


  454. An algebra for fine-grained integration of XACML policies. [Citation Graph (, )][DBLP]


  455. Supporting RBAC with XACML+OWL. [Citation Graph (, )][DBLP]


  456. Automating role-based provisioning by learning from examples. [Citation Graph (, )][DBLP]


  457. Access control policy combining: theory meets practice. [Citation Graph (, )][DBLP]


  458. Enforcing spatial constraints for mobile RBAC systems. [Citation Graph (, )][DBLP]


  459. Assuring Data Trustworthiness - Concepts and Research Challenges. [Citation Graph (, )][DBLP]


  460. An Approach to Evaluate Data Trustworthiness Based on Data Provenance. [Citation Graph (, )][DBLP]


  461. ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. [Citation Graph (, )][DBLP]


  462. Responding to Anomalous Database Requests. [Citation Graph (, )][DBLP]


  463. Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP]


  464. An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP]


  465. Privacy-Preserving Techniques for Location-Based Services. [Citation Graph (, )][DBLP]


  466. VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  467. StreamShield: a stream-centric approach towards security and privacy in data stream environments. [Citation Graph (, )][DBLP]


  468. Mask: a system for privacy-preserving policy-based access to published content. [Citation Graph (, )][DBLP]


  469. A Hybrid Technique for Private Location-Based Queries with Database Protection. [Citation Graph (, )][DBLP]


  470. Adaptive Management of Multigranular Spatio-Temporal Object Attributes. [Citation Graph (, )][DBLP]


  471. Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP]


  472. Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. [Citation Graph (, )][DBLP]


  473. Information carrying identity proof trees. [Citation Graph (, )][DBLP]


  474. Aggregating uncertain access risk estimations from different sources invited paper. [Citation Graph (, )][DBLP]


  475. A structure preserving approach for securing XML documents. [Citation Graph (, )][DBLP]


  476. A Federated Digital Identity Management Approach for Business Processes. [Citation Graph (, )][DBLP]


  477. Profiling Database Application to Detect SQL Injection Attacks. [Citation Graph (, )][DBLP]


  478. L'Elimination de la subjectivité dans la recommandation de confiance. [Citation Graph (, )][DBLP]


  479. Privacy-preserving management of transactions' receipts for mobile environments. [Citation Graph (, )][DBLP]


  480. Biometrics-based identifiers for digital identity management. [Citation Graph (, )][DBLP]


  481. Efficient and privacy-preserving enforcement of attribute-based access control. [Citation Graph (, )][DBLP]


  482. Cryptanalysis of the LCSS RFID Authentication Protocol. [Citation Graph (, )][DBLP]


  483. Assured information sharing: concepts and issues. [Citation Graph (, )][DBLP]


  484. Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP]


  485. A Policy-Based Accountability Tool for Grid Computing Systems. [Citation Graph (, )][DBLP]


  486. Multi-granular Spatio-temporal Object Models: Concepts and Research Directions. [Citation Graph (, )][DBLP]


  487. Trustworthy objects. [Citation Graph (, )][DBLP]


  488. Replacing Lost or Stolen E-Passports. [Citation Graph (, )][DBLP]


  489. An Interoperable Approach to Multifactor Identity Verification. [Citation Graph (, )][DBLP]


  490. Privacy-preserving Digital Identity Management for Cloud Computing. [Citation Graph (, )][DBLP]


Search in 2.967secs, Finished in 2.994secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002