


default search action
Elisa Bertino
Person information
- affiliation: Purdue University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j402]Mostafa Mirzaie, Behshid Behkamal, Mohammad Allahbakhsh, Samad Paydar, Elisa Bertino:
Ada-Context: adaptive context-aware grid-based approach for curation of data streams. Data Min. Knowl. Discov. 39(3): 22 (2025) - [j401]Zheng Yan
, Tieyan Li, Valtteri Niemi, Elisa Bertino:
Special Issue Editorial: Trustworthy and Intelligent 6G Mobile Networks. IEEE Netw. 39(2): 69-71 (2025) - [j400]Daren Fadolalkarim
, Elisa Bertino
:
DCAFixer: An Automatic Tool for Bug Detection and Repair for Database Java Client Applications. IEEE Trans. Dependable Secur. Comput. 22(1): 327-342 (2025) - [j399]Sorin Adam Matei, Diane Jackson, Elisa Bertino:
Ethical reasoning in artificial intelligence: A cybersecurity perspective. Inf. Soc. 41(2): 110-122 (2025) - [j398]Wenyue Sun
, Qian Chen
, Xuehua Song
, Elisa Bertino
, Changda Wang
:
Network Traffic Matrix Estimation Based on Link Loads Sampling. IEEE Trans. Netw. Sci. Eng. 12(3): 1524-1539 (2025) - [c674]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples. NDSS 2025 - [i50]Mir Imtiaz Mostafiz, Imtiaz Karim, Elisa Bertino:
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks? CoRR abs/2503.09726 (2025) - 2024
- [j397]Sonam Bhardwaj
, Adrian Shuai Li, Mayank Dave
, Elisa Bertino:
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation. Comput. Secur. 140: 103769 (2024) - [j396]Antonino Rullo
, Daniele Midi, Anand Mudgerikar
, Elisa Bertino
:
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT. IEEE Internet Things J. 11(7): 12579-12601 (2024) - [j395]Yiwei Zhang
, Siqi Ma
, Tiancheng Chen, Juanru Li
, Robert H. Deng
, Elisa Bertino
:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 21(4): 1544-1556 (2024) - [j394]Yong-Feng Ge
, Hua Wang
, Elisa Bertino
, Zhi-Hui Zhan
, Jinli Cao
, Yanchun Zhang
, Jun Zhang
:
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility. IEEE Trans. Dependable Secur. Comput. 21(4): 2296-2311 (2024) - [j393]Jie Wang
, Zheng Yan
, Jiahe Lan
, Elisa Bertino
, Witold Pedrycz
:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. IEEE Trans. Dependable Secur. Comput. 21(5): 4433-4450 (2024) - [j392]Alian Yu
, Jian Kang
, Joshua Morris
, Elisa Bertino
, Dan Lin
:
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 21(5): 4953-4966 (2024) - [j391]Ruidong Han
, Huihui Gong, Siqi Ma
, Juanru Li, Chang Xu
, Elisa Bertino
, Surya Nepal
, Zhuo Ma
, Jianfeng Ma
:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j390]Mengdie Huang
, Hyunwoo Lee
, Ashish Kundu
, Xiaofeng Chen
, Anand Mudgerikar
, Ninghui Li
, Elisa Bertino
:
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks. ACM Trans. Internet Things 5(3): 15:1-15:34 (2024) - [j389]Hasini Gunasinghe
, Mikhail J. Atallah
, Elisa Bertino
:
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises. ACM Trans. Priv. Secur. 27(3): 25:1-25:31 (2024) - [j388]Yong-Feng Ge
, Elisa Bertino
, Hua Wang
, Jinli Cao
, Yanchun Zhang
:
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency. ACM Trans. Knowl. Discov. Data 18(1): 20:1-20:23 (2024) - [j387]Huan Rong
, Gongchi Chen
, Tinghuai Ma
, Victor S. Sheng
, Elisa Bertino
:
FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level. IEEE Trans. Knowl. Data Eng. 36(1): 167-183 (2024) - [c673]Elisa Bertino, Carl K. Chang, Rong N. Chang, Peter Chen, Ernesto Damiani, Sumi Helal, Dennis Gannon, Frank Leymann, Hong Mei, Dejan S. Milojicic, Stephen S. Yau:
2024 IEEE World Congress on Services. CLOUD 2024: xii - [c672]Elisa Bertino, Carl K. Chang, Rong N. Chang, Peter Chen, Ernesto Damiani, Sumi Helal, Dennis Gannon, Frank Leymann, Hong Mei, Dejan S. Milojicic, Stephen S. Yau:
Message from Rong N. Chang, Steering Committee Chair. SSE 2024: xi - [c671]Zilin Shen
, Imtiaz Karim
, Elisa Bertino
:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. AsiaCCS 2024 - [c670]Charalampos Katsis, Xin Jin, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs. CIC 2024: 9-18 - [c669]Mirza Masfiqur Rahman, Ashish Kundu, Elisa Bertino:
Poster: Benchmarking of Code Generative LLMs. ICDCS 2024: 1448-1449 - [c668]Yiwei Zhang, Rouzbeh Behnia, Attila A. Yavuz, Reza Ebrahimi, Elisa Bertino:
Uncovering Attacks and Defenses in Secure Aggregation for Federated Deep Learning. ICDM (Workshops) 2024: 650-656 - [c667]Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, Martin Byung-Guk Jun, Ali Shakouri:
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data. INDIN 2024: 1-8 - [c666]Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim:
Sharing cyber threat intelligence: Does it really help? NDSS 2024 - [c665]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. SP 2024: 1646-1664 - [c664]Mengdie Huang
, Yingjun Lin, Xiaofeng Chen, Elisa Bertino:
MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing. TrustCom 2024: 767-774 - [c663]Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino:
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. USENIX Security Symposium 2024 - [i49]Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino:
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning. CoRR abs/2401.04958 (2024) - [i48]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Transfer Learning for Security: Challenges and Future Directions. CoRR abs/2403.00935 (2024) - [i47]Pradip Kunwar, Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Elisa Bertino:
SoK: Leveraging Transformers for Malware Analysis. CoRR abs/2405.17190 (2024) - [i46]Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino:
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. CoRR abs/2407.13742 (2024) - [i45]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs. CoRR abs/2407.13918 (2024) - [i44]Yiwei Zhang, Rouzbeh Behnia, Attila A. Yavuz, Reza Ebrahimi, Elisa Bertino:
Uncovering Attacks and Defenses in Secure Aggregation for Federated Deep Learning. CoRR abs/2410.09676 (2024) - [i43]Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, Martin Byung-Guk Jun, Ali Shakouri:
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data. CoRR abs/2410.17574 (2024) - [i42]Charalampos Katsis, Elisa Bertino:
ZT-SDN: An ML-powered Zero-Trust Architecture for Software-Defined Networks. CoRR abs/2411.15020 (2024) - [i41]Joshua Groen, Simone Di Valerio, Imtiaz Karim, Davide Villa, Yiewi Zhang, Leonardo Bonati, Michele Polese, Salvatore D'Oro, Tommaso Melodia, Elisa Bertino, Francesca Cuomo, Kaushik R. Chowdhury:
TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments. CoRR abs/2412.13049 (2024) - [i40]Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. IACR Cryptol. ePrint Arch. 2024: 1467 (2024) - 2023
- [j386]Mostafa Mirzaie, Behshid Behkamal
, Mohammad Allahbakhsh
, Samad Paydar, Elisa Bertino:
State of the art on quality control for data streams: A systematic literature review. Comput. Sci. Rev. 48: 100554 (2023) - [j385]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [j384]Omar Hasan
, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55(2): 32:1-32:37 (2023) - [j383]Elisa Bertino
:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. IEEE Secur. Priv. 21(1): 91-92 (2023) - [j382]Elisa Bertino
, Suparna Bhattacharya
, Elena Ferrari
, Dejan S. Milojicic
:
Trustworthy AI and Data Lineage. IEEE Internet Comput. 27(6): 5-6 (2023) - [j381]Antonino Rullo
, Elisa Bertino
, Kui Ren
:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j380]Mingshan You, Jiao Yin
, Hua Wang
, Jinli Cao, Kate N. Wang, Yuan Miao
, Elisa Bertino:
A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (WWW) 26(2): 827-848 (2023) - [c662]Amani Abu Jabal
, Elisa Bertino
, Jorge Lobo
, Dinesh C. Verma
, Seraphin B. Calo
, Alessandra Russo
:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CODASPY 2023: 263-272 - [c661]Elisa Bertino, Hyunwoo Lee, Mengdie Huang
, Charalampos Katsis, Zilin Shen, Bruno Ribeiro, Daniel De Mello, Ashish Kundu:
A Pro-Active Defense Framework for IoT Systems. CIC 2023: 125-132 - [c660]Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. ESORICS (2) 2023: 166-192 - [c659]Anand Mudgerikar, Elisa Bertino:
Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning. ICCCN 2023: 1-10 - [c658]Elisa Bertino, Baochun Li, Ophir Frieder, Xiaohua Jia:
Welcome Message. ICDCS 2023: xxii-xxiii - [c657]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu
, Ting-Yan Wu
:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. ICIT 2023: 1-8 - [c656]Imtiaz Karim
, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. IJCNLP (Findings) 2023: 20-38 - [c655]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Zhao Yang Dong:
A Universally Composable Key Exchange Framework for Operational Technology Communication Protocols. SmartGridComm 2023: 1-6 - [c654]Imtiaz Karim
, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino:
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. SP 2023: 3209-3227 - [c653]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - [c652]Sanghak Oh
, Minwook Lee
, Hyunwoo Lee
, Elisa Bertino
, Hyoungshick Kim
:
AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN. WWW 2023: 2318-2328 - [i39]Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. CoRR abs/2301.09201 (2023) - [i38]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. CoRR abs/2306.00202 (2023) - [i37]Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N. Wegman:
Maximal Domain Independent Representations Improve Transfer Learning. CoRR abs/2306.00262 (2023) - [i36]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support. CoRR abs/2306.13339 (2023) - [i35]Diane Jackson, Sorin Adam Matei, Elisa Bertino:
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report. CoRR abs/2311.00903 (2023) - [i34]Sorin Adam Matei, Elisa Bertino:
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements. CoRR abs/2311.04326 (2023) - [i33]Zilin Shen, Imtiaz Karim, Elisa Bertino:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. CoRR abs/2312.07877 (2023) - [i32]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. CoRR abs/2312.09665 (2023) - [i31]Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs. CoRR abs/2312.13119 (2023) - 2022
- [j379]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Ke Meng, Zhao Yang Dong:
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Comput. Secur. 115: 102610 (2022) - [j378]Adnan Ahmad
, Brian Whitworth, Elisa Bertino:
A framework for the application of socio-technical design methodology. Ethics Inf. Technol. 24(4): 46 (2022) - [j377]Srinibas Swain
, Deepak Puthal
, Elisa Bertino
:
CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection. IEEE Intell. Syst. 37(5): 59-65 (2022) - [j376]Elisa Bertino:
The Persistent Problem of Software Insecurity. IEEE Secur. Priv. 20(3): 107-108 (2022) - [j375]Xu Yang
, Xun Yi
, Ibrahim Khalil
, Junwei Luo, Elisa Bertino
, Surya Nepal
, Xinyi Huang
:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j374]Elisa Bertino, Haya Schulmann, Michael Waidner
:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [j373]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Data Quality, Annotation, and Provenance. ACM J. Data Inf. Qual. 14(1): 1:1-1:3 (2022) - [j372]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Uses Cases and Applications. ACM J. Data Inf. Qual. 14(2): 6:1-6:3 (2022) - [j371]Huawei Huang
, Salil S. Kanhere
, Jiawen Kang
, Zehui Xiong
, Lei Zhang
, Bhaskar Krishnamachari
, Elisa Bertino
, Sichao Yang:
Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications. IEEE J. Sel. Areas Commun. 40(12): 3299-3304 (2022) - [j370]Fabrizio Cicala
, Elisa Bertino
:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 19(2): 1239-1253 (2022) - [j369]Siqi Ma
, Juanru Li, Surya Nepal
, Diethelm Ostry, David Lo
, Sanjay K. Jha
, Robert H. Deng
, Elisa Bertino
:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j368]Qinbao Xu
, Elisa Bertino
, Changda Wang
:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. IEEE Trans. Inf. Forensics Secur. 17: 3511-3524 (2022) - [j367]Mohammad Saidur Rahman, Ibrahim Khalil
, Xun Yi, Mohammed Atiquzzaman
, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. ACM Trans. Internet Techn. 22(3): 57:1-57:25 (2022) - [j366]Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. ACM Trans. Internet Techn. 22(3): 66:1-66:20 (2022) - [j365]Andrzej Goscinski
, Elisa Bertino, Shangguang Wang
:
Guest Editor's Introduction: Special Section on EdgeAI as a Service. IEEE Trans. Serv. Comput. 15(2): 588-590 (2022) - [j364]Mohammad Allahbakhsh
, Haleh Amintoosi
, Aleksandar Ignjatovic, Elisa Bertino
:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. IEEE Trans. Serv. Comput. 15(2): 698-709 (2022) - [j363]Mohammad Allahbakhsh
, Haleh Amintoosi
, Behshid Behkamal
, Salil S. Kanhere
, Elisa Bertino
:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. IEEE Trans. Serv. Comput. 15(3): 1486-1497 (2022) - [c651]Hyunwoo Lee, Imtiaz Karim
, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c650]Laurent d'Orazio, Jalil Boukhobza
, Omer F. Rana
, Juba Agoun, Le Gruenwald, Hervé Rannou, Elisa Bertino, Mohand-Saïd Hacid, Taofik Saïdi, Georges Bossert, Van Long Nguyen Huu, Dimitri Tombroff, Makoto Onizuka
:
The Lannion report on Big Data and Security Monitoring Research. IEEE Big Data 2022: 2960-2969 - [c649]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo
, Elisa Bertino:
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures. CODASPY 2022: 167-178 - [c648]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c647]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury
, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis
, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia
, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying
:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c646]Ankush Singla, Elisa Bertino:
DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems. CIC 2022: 89-98 - [c645]Yiwei Zhang, Siqi Ma
, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c644]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c643]Yi Xie, Wen Li, Yuqing Sun
, Elisa Bertino, Bin Gong:
Subspace Embedding Based New Paper Recommendation. ICDE 2022: 1767-1780 - [c642]Ruidong Han
, Chao Yang, Siqi Ma
, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c641]Yunlong Lyu
, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma
, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [c640]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [e76]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13338, Springer 2022, ISBN 978-3-031-06793-8 [contents] - [e75]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7 [contents] - [e74]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7 [contents] - [i30]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - [i29]Yiwei Zhang, Siqi Ma
, Tiancheng Chen, Juanru Li, Robert H. Deng
, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - 2021
- [j362]Elisa Bertino:
An excellent venue for multidisciplinary research in civil and infrastructure engineering. Comput. Aided Civ. Infrastructure Eng. 36(6): 677 (2021) - [j361]Elisa Bertino, Mohammad R. Jahanshahi, Ankush Singla, Rih-Teng Wu:
Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap. Discov. Internet Things 1(1) (2021) - [j360]Elisa Bertino
:
Attacks on Artificial Intelligence [Last Word]. IEEE Secur. Priv. 19(1): 103-104 (2021) - [j359]Elisa Bertino
:
Zero Trust Architecture: Does It Help? IEEE Secur. Priv. 19(5): 95-96 (2021) - [j358]Mohammad Allahbakhsh, Haleh Amintoosi
, Behshid Behkamal, Amin Beheshti
, Elisa Bertino:
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems. J. Informetrics 15(2): 101127 (2021) - [j357]Yinghui Zhang
, Robert H. Deng
, Elisa Bertino
, Dong Zheng
:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j356]Shagufta Mehnaz
, Elisa Bertino
:
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles. IEEE Trans. Dependable Secur. Comput. 18(6): 2535-2550 (2021) - [j355]Shahriar Badsha
, Xun Yi
, Ibrahim Khalil
, Dongxi Liu, Surya Nepal
, Elisa Bertino
, Kwok-Yan Lam
:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [j354]Amani Abu Jabal
, Maryam Davari
, Elisa Bertino
, Christian Makaya, Seraphin B. Calo
, Dinesh C. Verma
, Christopher Williams:
ProFact: A Provenance-Based Analytics Framework for Access Control Policies. IEEE Trans. Serv. Comput. 14(6): 1914-1928 (2021) - [c639]Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong:
Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. ACSAC 2021: 439-454 - [c638]Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz
, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. AsiaCCS 2021: 501-515 - [c637]Syed Rafiul Hussain, Imtiaz Karim
, Abdullah Al Ishtiaq
, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. CCS 2021: 1082-1099 - [c636]Elisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora
, Sagar Samtani
, Sudip Mittal, Maanak Gupta:
AI for Security and Security for AI. CODASPY 2021: 333-334 - [c635]Anand Mudgerikar, Elisa Bertino, Jorge Lobo, Dinesh C. Verma:
A Security-Constrained Reinforcement Learning Framework for Software Defined Networks. ICC 2021: 1-6 - [c634]Imtiaz Karim
, Syed Rafiul Hussain, Elisa Bertino:
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations. ICDCS 2021: 773-785 - [c633]Siqi Ma
, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal
, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c632]Elisa Bertino, Kenneth Brancik:
Services for Zero Trust Architectures - A Research Roadmap. ICWS 2021: 14-20 - [c631]Mark Law, Alessandra Russo, Krysia Broda, Elisa Bertino:
Scalable Non-observational Predicate Learning in ASP. IJCAI 2021: 1936-1943 - [c630]Elisa Bertino, Imtiaz Karim:
AI-powered Network Security: Approaches and Research Directions. NSysS 2021: 97-105 - [c629]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo
, Elisa Bertino:
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. SACMAT 2021: 165-174 - [c628]Yi Xie, Yuqing Sun
, Elisa Bertino:
Learning Domain Semantics and Cross-Domain Correlations for Paper Recommendation. SIGIR 2021: 706-715 - [c627]Mortada Al-Banna, Boualem Benatallah
, Moshe Chai Barukh, Elisa Bertino, Salil S. Kanhere
:
Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions. WISE (1) 2021: 3-13 - [e73]Elisa Bertino
, Haya Schulmann
, Michael Waidner
:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents] - [e72]Elisa Bertino
, Haya Schulmann
, Michael Waidner
:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents] - [e71]Xingming Sun
, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino
:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12736, Springer 2021, ISBN 978-3-030-78608-3 [contents] - [e70]Xingming Sun
, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino
:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3 [contents] - [i28]Elisa Bertino, Daniel W. Bliss, Daniel Lopresti, Larry Peterson, Henning Schulzrinne:
Computing Research Challenges in Next Generation Wireless Networking. CoRR abs/2101.01279 (2021) - [i27]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i26]Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino:
Simeon - Secure Federated Machine Learning Through Iterative Filtering. CoRR abs/2103.07704 (2021) - [i25]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - 2020
- [j353]Elisa Bertino:
Security of cellular networks position paper. CCF Trans. Netw. 3(2): 93-96 (2020) - [j352]Imtiaz Karim
, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones. DTRAP 1(4): 23:1-23:29 (2020) - [j351]Elisa Bertino:
The Quest for Data Transparency. IEEE Secur. Priv. 18(3): 67-68 (2020) - [j350]Zheng Yan
, Willy Susilo
, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j349]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [j348]Xun Yi
, Elisa Bertino
, Fang-Yu Rao
, Kwok-Yan Lam
, Surya Nepal
, Athman Bouguettaya
:
Privacy-Preserving User Profile Matching in Social Networks. IEEE Trans. Knowl. Data Eng. 32(8): 1572-1585 (2020) - [j347]Jongho Won
, Seung-Hyun Seo
, Elisa Bertino
:
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles. IEEE Trans. Mob. Comput. 19(5): 1023-1039 (2020) - [j346]Anand Mudgerikar
, Puneet Sharma, Elisa Bertino:
Edge-Based Intrusion Detection for IoT devices. ACM Trans. Manag. Inf. Syst. 11(4): 18:1-18:21 (2020) - [c626]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria. AAAI 2020: 2877-2885 - [c625]Charalampos Katsis, Ankush Singla, Elisa Bertino:
Real-time Digital Signatures for Named Data Networking. ICN 2020: 149-151 - [c624]Siqi Ma
, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal
, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c623]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. AsiaCCS 2020: 127-140 - [c622]Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma
:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. CODASPY 2020: 220-222 - [c621]Hong Mei, Elisa Bertino:
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs. EDGE 2020: 1 - [c620]Amani Abu Jabal, Elisa Bertino, Jorge Lobo
, Mark Law, Alessandra Russo
, Seraphin B. Calo, Dinesh C. Verma:
Polisma - A Framework for Learning Attribute-Based Access Control Policies. ESORICS (1) 2020: 523-544 - [c619]Anand Mudgerikar, Elisa Bertino:
Jarvis: Moving Towards a Smarter Internet of Things. ICDCS 2020: 122-134 - [c618]Xun Yi, Russell Paulet, Elisa Bertino, Fang-Yu Rao:
Practical Anonymous Subscription with Revocation Based on Broadcast Encryption. ICDE 2020: 241-252 - [c617]Daren Fadolalkarim, Elisa Bertino, Asmaa Sallam:
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs. ICDE 2020: 265-276 - [c616]Shagufta Mehnaz, Elisa Bertino:
Privacy-preserving Real-time Anomaly Detection Using Edge Computing. ICDE 2020: 469-480 - [c615]Jorge Lobo
, Elisa Bertino, Alessandra Russo
:
On Security Policy Migrations. SACMAT 2020: 179-188 - [c614]Hong Mei, Elisa Bertino:
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs. SERVICES 2020: 1-2 - [c613]Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data and Machine Learning. TPS-ISA 2020: 134-137 - [c612]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [e69]Xingming Sun, Jinwei Wang
, Elisa Bertino
:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12239, Springer 2020, ISBN 978-3-030-57883-1 [contents] - [e68]Xingming Sun, Jinwei Wang
, Elisa Bertino
:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0 [contents] - [i24]Elisa Bertino, Syed Rafiul Hussain, Omar Chowdhury:
5G Security and Privacy: A Research Roadmap. CoRR abs/2003.13604 (2020) - [i23]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CoRR abs/2010.09767 (2020) - [i22]Shagufta Mehnaz, Ninghui Li, Elisa Bertino:
Black-box Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2012.03404 (2020) - [i21]Elisa Bertino, Sujata Banerjee:
Artificial Intelligence at the Edge. CoRR abs/2012.05410 (2020) - [i20]Elisa Bertino, Finale Doshi-Velez, Maria L. Gini, Daniel Lopresti, David C. Parkes:
Artificial Intelligence & Cooperation. CoRR abs/2012.06034 (2020) - [i19]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. CoRR abs/2012.09520 (2020)
2010 – 2019
- 2019
- [j345]Rih-Teng Wu
, Ankush Singla, Mohammad R. Jahanshahi, Elisa Bertino, Bong Jun Ko, Dinesh C. Verma:
Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures. Comput. Aided Civ. Infrastructure Eng. 34(9): 774-789 (2019) - [j344]Daren Fadolalkarim, Elisa Bertino:
A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration. Comput. Secur. 84: 276-287 (2019) - [j343]Elisa Bertino
, Shawn Merrill, Alina Nesen, Christine Utz
:
Redefining Data Transparency: A Multidimensional Approach. Computer 52(1): 16-26 (2019) - [j342]Amani Abu Jabal
, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin B. Calo, Dinesh C. Verma, Alessandra Russo
, Christopher Williams:
Methods and Tools for Policy Analysis. ACM Comput. Surv. 51(6): 121:1-121:35 (2019) - [j341]Ankush Singla
, Elisa Bertino
:
How Deep Learning Is Making Information Security More Intelligent. IEEE Secur. Priv. 17(3): 56-65 (2019) - [j340]Elisa Bertino
:
It Takes a Village to Secure Cellular Networks. IEEE Secur. Priv. 17(5): 96-95 (2019) - [j339]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j338]Elisa Bertino, Ashish Kundu, Zehra Sura:
Data Transparency with Blockchain and AI Ethics. ACM J. Data Inf. Qual. 11(4): 16:1-16:8 (2019) - [j337]Fang-Yu Rao
, Elisa Bertino
:
Privacy Techniques for Edge Computing Systems. Proc. IEEE 107(8): 1632-1654 (2019) - [j336]Abubakar Sadiq Sani
, Dong Yuan, Wei Bao
, Zhao Yang Dong
, Branka Vucetic
, Elisa Bertino
:
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet. IEEE Trans. Inf. Forensics Secur. 14(8): 2113-2127 (2019) - [j335]Fang-Yu Rao, Jianneng Cao, Elisa Bertino, Murat Kantarcioglu:
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records. ACM Trans. Priv. Secur. 22(3): 15:1-15:36 (2019) - [j334]Jongho Won
, Elisa Bertino
:
Robust Sensor Localization against Known Sensor Position Attacks. IEEE Trans. Mob. Comput. 18(12): 2954-2967 (2019) - [c611]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
Representing and Learning Grammars in Answer Set Programming. AAAI 2019: 2919-2928 - [c610]Siqi Ma
, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal
, Diethelm Ostry, Elisa Bertino, Robert H. Deng
, Zhuo Ma, Sanjay Jha
:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c609]Imtiaz Karim
, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. ACSAC 2019: 529-543 - [c608]Luca Cappelletti
, Stefano Valtolina, Giorgio Valentini, Marco Mesiti, Elisa Bertino:
On the Quality of Classification Models for Inferring ABAC Policies from Access Logs. IEEE BigData 2019: 4000-4007 - [c607]Daniel Cunnington, Mark Law, Alessandra Russo
, Elisa Bertino, Seraphin B. Calo:
Towards a Neural-Symbolic Generative Policy Model. IEEE BigData 2019: 4008-4016 - [c606]Maryam Davari, Elisa Bertino:
Access Control Model Extensions to Support Data Privacy Protection based on GDPR. IEEE BigData 2019: 4017-4024 - [c605]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Alessandra Russo
, Graham White:
Policy based Ensembles for applying ML on Big Data. IEEE BigData 2019: 4038-4044 - [c604]Anand Mudgerikar, Puneet Sharma, Elisa Bertino:
E-Spion: A System-Level Intrusion Detection System for IoT Devices. AsiaCCS 2019: 493-500 - [c603]Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim
, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. CCS 2019: 669-684 - [c602]Huan Yang, Tianyuan Liu, Yuqing Sun
, Elisa Bertino:
Exploring The Interaction Effects for Temporal Spatial Behavior Prediction. CIKM 2019: 2013-2022 - [c601]Asmaa Sallam, Elisa Bertino:
Result-Based Detection of Insider Threats to Relational Databases. CODASPY 2019: 133-143 - [c600]Elisa Bertino:
IoT Security A Comprehensive Life Cycle Framework. CIC 2019: 196-203 - [c599]Syed Rafiul Hussain, Shahriar Nirjon, Elisa Bertino:
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways. DCOSS 2019: 66-73 - [c598]Xun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao:
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation. ESORICS (2) 2019: 387-411 - [c597]Siqi Ma
, Elisa Bertino, Surya Nepal
, Juanru Li, Diethelm Ostry, Robert H. Deng
, Sanjay Jha
:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c596]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa:
Generating Client Side Policies for Cyber-Physical Safety. ICCCN 2019: 1-8 - [c595]Elisa Bertino, Graham White, Jorge Lobo
, John Ingham, Gregory H. Cirincione, Alessandra Russo
, Mark Law, Seraphin B. Calo, Irene Manotas, Dinesh C. Verma, Amani Abu Jabal, Daniel Cunnington, Geeth de Mel:
Generative Policies for Coalition Systems - A Symbolic Learning Framework. ICDCS 2019: 1590-1600 - [c594]Jian Kang, Dan Lin, Elisa Bertino, Ozan K. Tonguz:
From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability. ICDCS 2019: 1730-1741 - [c593]Abubakar Sadiq Sani, Dong Yuan, Wei Bao
, Phee Lep Yeoh
, Zhao Yang Dong, Branka Vucetic
, Elisa Bertino:
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy. ICDCS 2019: 1920-1930 - [c592]Graham White, Daniel Cunnington, Mark Law, Elisa Bertino, Geeth de Mel, Alessandra Russo
:
A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models. ICMLA 2019: 1314-1321 - [c591]Daniel Cunnington, Irene Manotas, Mark Law, Geeth de Mel, Seraphin B. Calo, Elisa Bertino, Alessandra Russo
:
A Generative Policy Model for Connected and Autonomous Vehicles. ITSC 2019: 1558-1565 - [c590]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - [c589]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning. SMARTCOMP 2019: 69-74 - [c588]Dinesh C. Verma, Elisa Bertino, Geeth de Mel, John Melrose:
On the Impact of Generative Policies on Security Metrics. SMARTCOMP 2019: 104-109 - [c587]Valentina Salapura, David Wood, Shonda Adena Witherspoon, Keith Grueneberg, Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo:
Generative Policy Framework for AI Training Data Curation. SMARTCOMP 2019: 475-477 - [c586]Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino:
Insecure connection bootstrapping in cellular networks: the root of all evil. WiSec 2019: 1-11 - [c585]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - [p12]Antonino Rullo
, Edoardo Serra
, Elisa Bertino, Jorge Lobo
:
Optimal Placement of Security Resources for the Internet of Things. The Internet of Things for Smart Urban Ecosystems 2019: 95-124 - [e67]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
12th IEEE International Conference on Cloud Computing, CLOUD 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2705-7 [contents] - [e66]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Services Computing, SCC 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2720-0 [contents] - [e65]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Big Data, BigData Congress 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2772-9 [contents] - [e64]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
3rd IEEE International Conference on Edge Computing, EDGE 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2708-8 [contents] - [e63]Seraphin B. Calo, Elisa Bertino, Dinesh C. Verma:
Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]. Lecture Notes in Computer Science 11550, Springer 2019, ISBN 978-3-030-17276-3 [contents] - [e62]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11632, Springer 2019, ISBN 978-3-030-24273-2 [contents] - [e61]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11633, Springer 2019, ISBN 978-3-030-24264-0 [contents] - [e60]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11634, Springer 2019, ISBN 978-3-030-24270-1 [contents] - [e59]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV. Lecture Notes in Computer Science 11635, Springer 2019, ISBN 978-3-030-24267-1 [contents] - [e58]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Internet of Things, ICIOT 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2714-9 [contents] - [e57]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Web Services, ICWS 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2717-0 [contents] - [e56]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Cognitive Computing, ICCC 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2711-8 [contents] - [i18]Dinesh C. Verma, Seraphin B. Calo, Shonda Witherspoon, Elisa Bertino, Amani Abu Jabal, Ananthram Swami, Greg Cirincione, Simon Julier, Graham White, Geeth de Mel, Gavin Pearson:
Federated Learning for Coalition Operations. CoRR abs/1910.06799 (2019) - 2018
- [j333]Elisa Bertino, Valentina Casola
, Aniello Castiglione
, Willy Susilo
:
Editorial: Security and privacy protection vs sustainable development. Comput. Secur. 76: 250-251 (2018) - [j332]Oyindamola Oluwatimi, Maria Luisa Damiani, Elisa Bertino:
A context-aware system to secure enterprise content: Incorporating reliability specifiers. Comput. Secur. 77: 162-178 (2018) - [j331]Amani Abu Jabal, Elisa Bertino:
A Comprehensive Query Language for Provenance Information. Int. J. Cooperative Inf. Syst. 27(3): 1850007:1-1850007:22 (2018) - [j330]Elisa Bertino, Mohammad R. Jahanshahi:
Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities - Framework and Challenges. ACM J. Data Inf. Qual. 10(1): 1:1-1:6 (2018) - [j329]Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Dinesh C. Verma, Christopher Williams:
The Challenge of Access Control Policies Quality. ACM J. Data Inf. Qual. 10(2): 6:1-6:6 (2018) - [j328]Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino:
Highly efficient randomized authentication in VANETs. Pervasive Mob. Comput. 44: 31-44 (2018) - [j327]Sorin Adam Matei
, Amani Abu Jabal
, Elisa Bertino:
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow. Soc. Netw. Anal. Min. 8(1): 36:1-36:16 (2018) - [j326]Bahman Rashidi
, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 13(3): 773-787 (2018) - [j325]Hasini Gunasinghe
, Elisa Bertino
:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. IEEE Trans. Inf. Forensics Secur. 13(4): 1042-1057 (2018) - [j324]Muhammad Umer Arshad
, Ashish Kundu, Elisa Bertino
, Arif Ghafoor
, Chinmay Kundu
:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. IEEE Trans. Knowl. Data Eng. 30(5): 866-879 (2018) - [j323]Syed Rafiul Hussain
, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino
:
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Trans. Mob. Comput. 17(4): 927-944 (2018) - [j322]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. ACM Trans. Internet Techn. 18(4): 55:1-55:20 (2018) - [j321]Xianqi Yu, Yuqing Sun
, Elisa Bertino, Xin Li:
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage. ACM Trans. Soc. Comput. 1(3): 11:1-11:25 (2018) - [c584]Oyindamola Oluwatimi, Elisa Bertino:
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. CODASPY 2018: 256-266 - [c583]Ankush Singla, Elisa Bertino:
Blockchain-Based PKI Solutions for IoT. CIC 2018: 9-15 - [c582]Jongho Won, Elisa Bertino:
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories. CIC 2018: 26-35 - [c581]Asmaa Sallam, Elisa Bertino:
Detection of Temporal Data Ex-Filtration Threats to Relational Databases. CIC 2018: 146-155 - [c580]Antonino Rullo
, Elisa Bertino, Domenico Saccà:
PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems. DSC 2018: 1-8 - [c579]Seraphin B. Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh C. Verma, Alessandra Russo
, Elisa Bertino:
AGENP: An ASGrammar-based GENerative Policy Framework. PADG@ESORICS 2018: 3-20 - [c578]Dinesh C. Verma, Seraphin B. Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani M. Abu Jabal, Greg Cirincione, Ananthram Swami, Gavin Pearson, Geeth de Mel:
Self-Generating Policies for Machine Learning in Coalition Environments. PADG@ESORICS 2018: 42-65 - [c577]Sorin Adam Matei
, Elisa Bertino:
Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation. PADG@ESORICS 2018: 69-81 - [c576]Asmaa Sallam, Elisa Bertino:
Techniques and Systems for Anomaly Detection in Database Systems. PADG@ESORICS 2018: 113-133 - [c575]Elisa Bertino, Dinesh C. Verma, Seraphin B. Calo:
A Policy System for Control of Data Fusion Processes and Derived Data. FUSION 2018: 807-813 - [c574]Greg Cirincione, Dinesh C. Verma, Elisa Bertino, Ananthram Swami:
Security Issues for Distributed Fusion in Coalition Environments. FUSION 2018: 830-837 - [c573]Xianqi Yu, Yuqing Sun
, Elisa Bertino, Xin Li:
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage. GROUP 2018: 39-50 - [c572]Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Hybrid Differentially-Private String Matching. ICDCS 2018: 478-488 - [c571]Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino, John Ingham, Gregory H. Cirincione:
How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management). ICDCS 2018: 1369-1376 - [c570]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Arif Ghafoor, Chinmay Kundu
:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. ICDE 2018: 1821-1822 - [c569]Arash Shaghaghi, Salil S. Kanhere
, Mohamed Ali Kâafar
, Elisa Bertino, Sanjay Jha
:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c568]Xun Yi, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials. MDM 2018: 187-196 - [c567]Jongho Won, Ankush Singla, Elisa Bertino, Greg Bollella:
Decentralized Public Key Infrastructure for Internet-of-Things. MILCOM 2018: 907-913 - [c566]Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino:
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. NDSS 2018 - [c565]Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, Moshe Chai Barukh:
Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 2018: 230 - [c564]Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino:
RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. RAID 2018: 114-136 - [c563]Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:
Self-Generation of Access Control Policies. SACMAT 2018: 39-47 - [c562]Elisa Bertino, Mohamed Nabeel:
Securing Named Data Networks: Challenges and the Way Forward. SACMAT 2018: 51-59 - [c561]Dan Thomsen, Elisa Bertino:
Network Policy Enforcement Using Transactions: The NEUTRON Approach. SACMAT 2018: 129-136 - [c560]Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash
, Maribel Fernández
:
Towards a Privacy-Aware Qunatified Self Data Management Framework. SACMAT 2018: 173-184 - [c559]Maryam Davari, Elisa Bertino:
Reactive Access Control Systems. SACMAT 2018: 205-207 - [p11]Elisa Bertino, Elena Ferrari:
Big Data Security and Privacy. A Comprehensive Guide Through the Italian Database Research 2018: 425-439 - [e55]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I. Lecture Notes in Computer Science 11063, Springer 2018, ISBN 978-3-030-00005-9 [contents] - [e54]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II. Lecture Notes in Computer Science 11064, Springer 2018, ISBN 978-3-030-00008-0 [contents] - [e53]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III. Lecture Notes in Computer Science 11065, Springer 2018, ISBN 978-3-030-00011-0 [contents] - [e52]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV. Lecture Notes in Computer Science 11066, Springer 2018, ISBN 978-3-030-00014-1 [contents] - [e51]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V. Lecture Notes in Computer Science 11067, Springer 2018, ISBN 978-3-030-00017-2 [contents] - [e50]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI. Lecture Notes in Computer Science 11068, Springer 2018, ISBN 978-3-030-00020-2 [contents] - [e49]Elisa Bertino, Dan Lin, Jorge Lobo:
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018. ACM 2018 [contents] - [i17]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - 2017
- [j320]Jongho Won
, Seung-Hyun Seo
, Elisa Bertino:
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications. IEEE Access 5: 3721-3749 (2017) - [j319]Muhammad Saleem Khan
, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Fine-Grained Analysis of Packet Loss in MANETs. IEEE Access 5: 7798-7807 (2017) - [j318]Bahman Rashidi
, Carol J. Fung, Elisa Bertino:
Android resource usage risk assessment using hidden Markov model and online learning. Comput. Secur. 65: 90-107 (2017) - [j317]Adnan Ahmad
, Brian Whitworth, Furkh Zeshan
, Elisa Bertino, Robert S. Friedman:
Extending social networks with delegation. Comput. Secur. 70: 546-564 (2017) - [j316]Elisa Bertino, Nayeem Islam:
Botnets and Internet of Things Security. Computer 50(2): 76-79 (2017) - [j315]Yang Xiang
, Elisa Bertino, Miroslaw Kutylowski:
Security and privacy in social networks. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j314]Elisa Bertino:
Editorial. Data Sci. Eng. 2(4): 253-254 (2017) - [j313]Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
Overview of Mobile Containerization Approaches and Open Research Directions. IEEE Secur. Priv. 15(1): 22-31 (2017) - [j312]Javid Habibi, Daniele Midi, Anand Mudgerikar
, Elisa Bertino:
Heimdall: Mitigating the Internet of Insecure Things. IEEE Internet Things J. 4(4): 968-978 (2017) - [j311]Jason R. C. Nurse, Elisa Bertino:
Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 1-3 (2017) - [j310]Muhammad Saleem Khan
, Daniele Midi, Saif Ur Rehman Malik
, Majid I. Khan, Nadeem Javaid
, Elisa Bertino:
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy. Mob. Networks Appl. 22(3): 493-509 (2017) - [j309]Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, Robert Michael Lefler, Donald Steiner:
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts. IEEE Syst. J. 11(2): 483-493 (2017) - [j308]Elisa Bertino:
The State of the Journal Editorial. IEEE Trans. Dependable Secur. Comput. 14(1): 1 (2017) - [j307]Elisa Bertino:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 14(6): 577 (2017) - [j306]Bahman Rashidi
, Carol J. Fung, Elisa Bertino:
A Collaborative DDoS Defence Framework Using Network Function Virtualization. IEEE Trans. Inf. Forensics Secur. 12(10): 2483-2497 (2017) - [j305]Attila Altay Yavuz
, Anand Mudgerikar, Ankush Singla, Ioannis Papapanagiotou, Elisa Bertino:
Real-Time Digital Signatures for Time-Critical Networks. IEEE Trans. Inf. Forensics Secur. 12(11): 2627-2639 (2017) - [j304]Antonino Rullo
, Daniele Midi, Edoardo Serra
, Elisa Bertino:
Pareto Optimal Security Resource Allocation for Internet of Things. ACM Trans. Priv. Secur. 20(4): 15:1-15:30 (2017) - [j303]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. ACM Trans. Priv. Secur. 20(4): 16:1-16:33 (2017) - [j302]Daniele Midi, Salmin Sultana, Elisa Bertino:
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks. ACM Trans. Sens. Networks 13(1): 1:1-1:38 (2017) - [j301]Changda Wang
, Elisa Bertino:
Sensor Network Provenance Compression Using Dynamic Bayesian Networks. ACM Trans. Sens. Networks 13(1): 5:1-5:32 (2017) - [j300]Lorenzo Bossi, Elisa Bertino, Syed Rafiul Hussain:
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection. IEEE Trans. Software Eng. 43(5): 415-431 (2017) - [j299]Qian Xiao
, Elisa Bertino:
Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey. WIREs Data Mining Knowl. Discov. 7(5) (2017) - [c558]Shagufta Mehnaz, Elisa Bertino:
Privacy-Preserving Multi-Party Analytics over Arbitrarily Partitioned Data. CLOUD 2017: 342-349 - [c557]Sorin Adam Matei
, Amani Abu Jabal, Elisa Bertino:
Do Sticky Elites Produce Online Knowledge of Higher Quality? ASONAM 2017: 72-79 - [c556]Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Chris Clifton:
Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper. BigData Congress 2017: 256-265 - [c555]Elisa Bertino, Geeth de Mel, Alessandra Russo
, Seraphin B. Calo, Dinesh C. Verma:
Community-based self generation of policies and processes for assets: Concepts and research directions. IEEE BigData 2017: 2961-2969 - [c554]Seraphin B. Calo, Emil Lupu, Elisa Bertino, Saritha Arunkumar, Gregory H. Cirincione, Brian Rivera, Alan Cullen:
Research challenges in dynamic policy-based autonomous security. IEEE BigData 2017: 2970-2973 - [c553]Daniele Midi, Mathias Payer, Elisa Bertino:
Memory Safety for Embedded Devices with nesCheck. AsiaCCS 2017: 127-139 - [c552]Danfeng (Daphne) Yao
, Elisa Bertino:
CCS 2017: Women in Cyber Security (CyberW) Workshop. CCS 2017: 2631-2632 - [c551]Ilsun You, Elisa Bertino:
MIST 2017: 9th International Workshop on Managing Insider Security Threats. CCS 2017: 2635-2636 - [c550]Elisa Bertino:
Security and Privacy in the IoT. Inscrypt 2017: 3-10 - [c549]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
Android malicious application detection using support vector machine and active learning. CNSM 2017: 1-9 - [c548]Shagufta Mehnaz, Elisa Bertino:
Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses. CODASPY 2017: 3-14 - [c547]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
Seamless and Secure Bluetooth LE Connection Migration. CODASPY 2017: 147-149 - [c546]Asmaa Sallam, Elisa Bertino:
Detection of Temporal Insider Threats to Relational Databases. CIC 2017: 406-415 - [c545]Amani Abu Jabal, Elisa Bertino, Geeth de Mel:
Provenance-Based Scientific Workflow Search. eScience 2017: 119-127 - [c544]Antonino Rullo
, Edoardo Serra
, Elisa Bertino, Jorge Lobo
:
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. ESORICS (2) 2017: 419-436 - [c543]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. EWSN 2017: 132-143 - [c542]Daniele Midi, Antonino Rullo
, Anand Mudgerikar, Elisa Bertino:
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things. ICDCS 2017: 656-666 - [c541]Shahriar Badsha, Xun Yi
, Ibrahim Khalil
, Elisa Bertino:
Privacy Preserving User-Based Recommender System. ICDCS 2017: 1074-1083 - [c540]Elisa Bertino, Seraphin B. Calo, Maroun Touma, Dinesh C. Verma, Christopher Williams, Brian Rivera:
A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions. ICDCS 2017: 1876-1886 - [c539]Antonino Rullo
, Edoardo Serra
, Elisa Bertino, Jorge Lobo
:
Shortfall-Based Optimal Security Provisioning for Internet of Things. ICDCS 2017: 2585-2586 - [c538]Jongho Won, Ankush Singla, Elisa Bertino:
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks. ICDCS Workshops 2017: 7-12 - [c537]Elisa Bertino:
Security and Privacy in the IoT. ICISSP 2017: 5 - [c536]Antonino Rullo
, Daniele Midi, Edoardo Serra
, Elisa Bertino:
A Game of Things: Strategic Allocation of Security Resources for IoT. IoTDI 2017: 185-190 - [c535]Elisa Bertino, Murat Kantarcioglu:
A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications. IRI 2017: 108-114 - [c534]Saritha Arunkumar, Mudhakar Srivatsa, Elisa Bertino:
Learning information release policies for preventing intersection attacks. MILCOM 2017: 794-799 - [c533]Alan Cullen, Bill Williams, Elisa Bertino, Saritha Arunkumar, Erisa Karafili, Emil Lupu:
Mission Support for Drones: a Policy Based Approach. DroNet@MobiSys 2017: 7-12 - [c532]Wei Jiang, Feng Li, Dan Lin, Elisa Bertino:
No one can track you: Randomized authentication in Vehicular Ad-hoc Networks. PerCom 2017: 197-206 - [c531]Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino:
Distributed Intelligence: Trends in the Management of Complex Systems. SACMAT 2017: 1-7 - [c530]Shagufta Mehnaz, Gowtham Bellala, Elisa Bertino:
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. SACMAT 2017: 219-230 - [c529]Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Christian Makaya, Maroun Touma, Dinesh C. Verma, Christopher Williams:
Provenance-Based Analytics Services for Access Control Policies. SERVICES 2017: 94-101 - [c528]Saritha Arunkumar, Stephen Pipes, Christian Makaya, Elisa Bertino, Erisa Karafili, Emil C. Lupu, Christopher Williams:
Next generation firewalls for dynamic coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c527]Diane Felmlee, Emil Lupu, Cassie McMillan, Erisa Karafili, Elisa Bertino:
Decision-making in policy governed human-autonomous systems teams. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c526]Erisa Karafili, Emil C. Lupu, Saritha Arunkumar, Elisa Bertino:
Argumentation-based policy analysis for drone systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c525]Dinesh C. Verma, Seraphin B. Calo, Supriyo Chakraborty, Elisa Bertino, Christopher Williams, J. Tucker, Brian Rivera:
Generative policy model for autonomic management. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c524]Christopher Williams, Elisa Bertino, Seraphin B. Calo, Dinesh C. Verma, K. Leung, Christopher Dearlove:
Towards an architecture for policy-based management of software defined coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c523]Shahriar Badsha, Xun Yi
, Ibrahim Khalil
, Dongxi Liu, Surya Nepal
, Elisa Bertino:
Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516 - [e48]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4910-9 [contents] - [e47]Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10602, Springer 2017, ISBN 978-3-319-68504-5 [contents] - [e46]Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10603, Springer 2017, ISBN 978-3-319-68541-0 [contents] - [e45]Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0 [contents] - 2016
- [j298]Arezou Soltani Panah
, Ron G. van Schyndel, Timos K. Sellis
, Elisa Bertino:
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques. IEEE Access 4: 2670-2704 (2016) - [j297]Elisa Bertino:
Securing Mobile Applications. Computer 49(2): 9 (2016) - [j296]Elisa Bertino:
Security Threats: Protecting the New Cyberfrontier. Computer 49(6): 11-14 (2016) - [j295]Hua Wang
, Xun Yi
, Elisa Bertino, Lili Sun:
Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28(3): 600-615 (2016) - [j294]Elisa Bertino:
Introduction to Data Science and Engineering. Data Sci. Eng. 1(1): 1-3 (2016) - [j293]Yuqing Sun
, Haoran Xu
, Elisa Bertino, Chao Sun:
A Data-Driven Evaluation for Insider Threats. Data Sci. Eng. 1(2): 73-85 (2016) - [j292]Elisa Bertino:
Editorial: Introduction to Data Security and Privacy. Data Sci. Eng. 1(3): 125-126 (2016) - [j291]Changda Wang
, Wenyi Zheng, Elisa Bertino:
Provenance for Wireless Sensor Networks: A Survey. Data Sci. Eng. 1(3): 189-200 (2016) - [j290]Shashi Shekhar, Elisa Bertino:
GeoInformatica welcomes a new co-editor-in-chief. GeoInformatica 20(4): 569-570 (2016) - [j289]Feng Hao
, Xun Yi
, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. J. Inf. Secur. Appl. 27-28: 1-2 (2016) - [j288]Xun Yi
, Fang-Yu Rao, Zahir Tari
, Feng Hao
, Elisa Bertino, Ibrahim Khalil
, Albert Y. Zomaya
:
ID2S Password-Authenticated Key Exchange Protocols. IEEE Trans. Computers 65(12): 3687-3701 (2016) - [j287]Seung-Hyun Seo, Jongho Won, Elisa Bertino:
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT. Trans. Data Priv. 9(2): 101-130 (2016) - [j286]Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. Trans. Data Priv. 9(3): 187-214 (2016) - [j285]Elisa Bertino:
The State of the Journal Editorial. IEEE Trans. Dependable Secur. Comput. 13(1): 1 (2016) - [j284]Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini
, Alexey V. Vinel:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 13(4): 409-410 (2016) - [j283]Xun Yi
, Russell Paulet, Elisa Bertino, Guandong Xu:
Private Cell Retrieval From Data Warehouses. IEEE Trans. Inf. Forensics Secur. 11(6): 1346-1361 (2016) - [j282]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan
:
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. IEEE Trans. Knowl. Data Eng. 28(6): 1546-1559 (2016) - [j281]Elisa Bertino, Kim-Kwang Raymond Choo
, Dimitrios Georgakopoulos, Surya Nepal
:
Internet of Things (IoT): Smart and Secure Service Delivery. ACM Trans. Internet Techn. 16(4): 22:1-22:7 (2016) - [j280]Daniele Midi, Elisa Bertino:
Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks. ACM Trans. Sens. Networks 12(2): 8:1-8:30 (2016) - [j279]Changda Wang, Syed Rafiul Hussain, Elisa Bertino:
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 405-418 (2016) - [j278]Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks. ACM Trans. Spatial Algorithms Syst. 2(2): 8:1-8:36 (2016) - [j277]Asmaa Sallam, Daren Fadolalkarim, Elisa Bertino, Qian Xiao:
Data and syntax centric anomaly detection for relational databases. WIREs Data Mining Knowl. Discov. 6(6): 231-239 (2016) - [c522]Elisa Bertino:
Big data security and privacy. IEEE BigData 2016: 3 - [c521]Elisa Bertino:
Data privacy for IoT systems: Concepts, approaches, and research directions. IEEE BigData 2016: 3645-3647 - [c520]Jongho Won, Elisa Bertino:
Inside Attack Filtering for Robust Sensor Localization. AsiaCCS 2016: 931-936 - [c519]Ilsun You, Elisa Bertino:
MIST 2016: 8th International Workshop on Managing Insider Security Threats. CCS 2016: 1890-1891 - [c518]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. CODASPY 2016: 26-37 - [c517]Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino:
PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. CODASPY 2016: 267-276 - [c516]Hasini Gunasinghe, Elisa Bertino:
RahasNym: Pseudonymous Identity Management System for Protecting against Linkability. CIC 2016: 74-85 - [c515]Amani Abu Jabal, Elisa Bertino:
QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework. CIC 2016: 131-138 - [c514]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from the SEPT Organizing Committee. COMPSAC 2016: 399 - [c513]Elisa Bertino:
Data Security and Privacy: Concepts, Approaches, and Research Directions. COMPSAC 2016: 400-407 - [c512]Amani Abu Jabal, Elisa Bertino:
SimP: Secure interoperable multi-granular provenance framework. eScience 2016: 270-275 - [c511]Elisa Bertino:
Data Security and Privacy in the IoT. EDBT 2016: 1-3 - [c510]Antonino Rullo
, Daniele Midi, Edoardo Serra
, Elisa Bertino:
Strategic Security Resource Allocation for Internet of Things. ICDCS 2016: 737-738 - [c509]Xun Yi, Elisa Bertino, Fang-Yu Rao, Athman Bouguettaya
:
Practical privacy-preserving user profile matching in social networks. ICDE 2016: 373-384 - [c508]Nariman Ammar, Zaki Malik
, Abdelmounaam Rezgui, Elisa Bertino:
XACML policy evaluation with dynamic context handling. ICDE 2016: 1570-1571 - [c507]Yuqing Sun
, Haoran Xu
, Elisa Bertino, Demin Li:
User Preference Based Link Inference for Social Network. ICWS 2016: 188-195 - [c506]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan
, Tim Finin
, Anupam Joshi
, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c505]Asmaa Sallam, Qian Xiao, Elisa Bertino, Daren Fadolalkarim:
Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper). IRI 2016: 20-29 - [c504]Seung-Hyun Seo
, Jongho Won, Elisa Bertino, You Sung Kang, Dooho Choi
:
A Security Framework for a Drone Delivery Service. DroNet@MobiSys 2016: 29-34 - [c503]Shagufta Mehnaz, Elisa Bertino:
Building robust temporal user profiles for anomaly detection in file system accesses. PST 2016: 207-210 - [c502]Oyindamola Oluwatimi, Elisa Bertino:
An Application Restriction System for Bring-Your-Own-Device Scenarios. SACMAT 2016: 25-36 - [c501]Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
A Context-Aware System to Secure Enterprise Content. SACMAT 2016: 63-72 - [e44]Ilsun You, Elisa Bertino:
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4571-2 [contents] - [e43]Snehasis Mukhopadhyay, ChengXiang Zhai, Elisa Bertino, Fabio Crestani, Javed Mostafa, Jie Tang, Luo Si, Xiaofang Zhou, Yi Chang, Yunyao Li, Parikshit Sondhi:
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, CIKM 2016, Indianapolis, IN, USA, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4073-1 [contents] - [e42]Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner:
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM 2016, ISBN 978-1-4503-3935-3 [contents] - [e41]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4079-3 [contents] - [e40]Xingming Sun, Alex X. Liu, Han-Chieh Chao, Elisa Bertino:
Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10039, 2016, ISBN 978-3-319-48670-3 [contents] - [e39]Xingming Sun, Alex X. Liu, Han-Chieh Chao, Elisa Bertino:
Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10040, 2016, ISBN 978-3-319-48673-4 [contents] - 2015
- [j276]Sabine Brunswicker, Elisa Bertino, Sorin Adam Matei
:
Big Data for Open Digital Innovation - A Research Roadmap. Big Data Res. 2(2): 53-58 (2015) - [j275]Elisa Bertino, Surya Nepal, Rajiv Ranjan
:
Building Sensor-Based Big Data Cyberinfrastructures. IEEE Cloud Comput. 2(5): 64-69 (2015) - [j274]Elisa Bertino:
Denial-of-Service Attacks to UMTS. Computer 48(2): 6 (2015) - [j273]Elisa Bertino, Robert H. Deng
, Xinyi Huang, Jianying Zhou
:
Security and privacy of electronic health information systems. Int. J. Inf. Sec. 14(6): 485-486 (2015) - [j272]Mohamed Nabeel
, Xiaoyu Ding, Seung-Hyun Seo
, Elisa Bertino:
Scalable end-to-end security for advanced metering infrastructures. Inf. Syst. 53: 213-223 (2015) - [j271]Salmin Sultana, Elisa Bertino:
A Distributed System for The Management of Fine-grained Provenance. J. Database Manag. 26(2): 32-47 (2015) - [j270]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Secur. Comput. 12(1): 98-110 (2015) - [j269]Elisa Bertino:
The State of the Journal Editorial. IEEE Trans. Dependable Secur. Comput. 12(2): 135 (2015) - [j268]Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino:
Context-Based Access Control Systems for Mobile Devices. IEEE Trans. Dependable Secur. Comput. 12(2): 150-163 (2015) - [j267]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab
:
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 12(3): 256-269 (2015) - [j266]Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: Mitigating Code Reuse Attacks Using Code Randomization. IEEE Trans. Dependable Secur. Comput. 12(3): 326-337 (2015) - [j265]Seung-Hyun Seo
, Jongho Won, Salmin Sultana, Elisa Bertino:
Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 10(2): 371-383 (2015) - [j264]Xiaokui Shu, Danfeng Yao
, Elisa Bertino:
Privacy-Preserving Detection of Sensitive Data Exposure. IEEE Trans. Inf. Forensics Secur. 10(5): 1092-1103 (2015) - [j263]Mohsen Rezvani, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Interdependent Security Risk Analysis of Hosts and Flows. IEEE Trans. Inf. Forensics Secur. 10(11): 2325-2339 (2015) - [j262]Nariman Ammar
, Zaki Malik
, Elisa Bertino, Abdelmounaam Rezgui:
XACML Policy Evaluation with Dynamic Context Handling. IEEE Trans. Knowl. Data Eng. 27(9): 2575-2588 (2015) - [c500]Elisa Bertino:
Big Data - Security and Privacy. BigData Congress 2015: 757-761 - [c499]Jongho Won, Seung-Hyun Seo
, Elisa Bertino:
A Secure Communication Protocol for Drones and Smart Objects. AsiaCCS 2015: 249-260 - [c498]Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya
:
Privacy-Preserving Association Rule Mining in Cloud Computing. AsiaCCS 2015: 439-450 - [c497]Ilsun You, Elisa Bertino:
MIST 2015: 7th International Workshop on Managing Insider Security Threats. CCS 2015: 1707-1708 - [c496]Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. CODASPY 2015: 1-11 - [c495]Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino:
DetAnom: Detecting Anomalous Database Transactions by Insiders. CODASPY 2015: 25-35 - [c494]Fang-Yu Rao, Bharath K. Samanthula, Elisa Bertino, Xun Yi
, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-user K-Means Clustering. CIC 2015: 80-89 - [c493]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from SEPT Symposium Organizing Committee. COMPSAC 2015: 421 - [c492]Daniele Midi, Antonio Tedeschi, Francesco Benedetto, Elisa Bertino:
Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses. FiCloud 2015: 748-753 - [c491]Javid Habibi, Aditi Gupta, Stephen Carlsony, Ajay Panicker, Elisa Bertino:
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles. ICDCS 2015: 642-652 - [c490]Hasini Gunasinghe, Elisa Bertino:
RahasNym: Protecting against Linkability in the Digital Identity Ecosystem. ICDCS 2015: 772-773 - [c489]Jongho Won, Elisa Bertino:
Inside Attack Filtering for Robust Sensor Localization. ICDCS 2015: 796-797 - [c488]Jianneng Cao, Fang-Yu Rao, Elisa Bertino, Murat Kantarcioglu:
A hybrid private record linkage scheme: Separating differentially private synopses from matching records. ICDE 2015: 1011-1022 - [c487]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A Collaborative Reputation System Based on Credibility Propagation in WSNs. ICPADS 2015: 1-8 - [c486]Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Adaptive Trust Update Frequency in MANETs. ICPADS 2015: 132-139 - [c485]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi:
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data. IRI 2015: 427-434 - [c484]Elisa Bertino, Nathan W. Hartman:
Cybersecurity for product lifecycle management a research roadmap. ISI 2015: 114-119 - [c483]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A trust assessment framework for streaming data in WSNs using iterative filtering. ISSNIP 2015: 1-6 - [c482]Jongho Won, Elisa Bertino:
Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. NSS 2015: 18-31 - [c481]Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino:
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. NSS 2015: 112-129 - [c480]Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino:
Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking. SACMAT 2015: 135-145 - [c479]Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation. TrustCom/BigDataSE/ISPA (1) 2015: 718-725 - [c478]Arezou Soltani Panah
, Ron G. van Schyndel, Timos K. Sellis
, Elisa Bertino:
In the shadows we trust: A secure aggregation tolerant watermark for data streams. WOWMOM 2015: 1-9 - [e38]Elisa Bertino, Ilsun You:
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3824-0 [contents] - [i16]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private $k$-Means Clustering. CoRR abs/1504.05998 (2015) - 2014
- [b9]Xun Yi, Russell Paulet, Elisa Bertino:
Homomorphic Encryption and Applications. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-12228-1, pp. 1-126 - [j261]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. Comput. Secur. 41: 52-67 (2014) - [j260]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah
, Amin Beheshti
, Norman Foo, Elisa Bertino:
Representation and querying of unfair evaluations in social rating systems. Comput. Secur. 41: 68-88 (2014) - [j259]Li Xu, Elisa Bertino, Yi Mu:
Security of new generation computing systems. Concurr. Comput. Pract. Exp. 26(8): 1475-1476 (2014) - [j258]Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli:
Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013. EAI Endorsed Trans. Collab. Comput. 1(1): e2 (2014) - [j257]Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino:
Privacy-Preserving Assessment of Social Network Data Trustworthiness. Int. J. Cooperative Inf. Syst. 23(2) (2014) - [j256]Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:
Guest editorial: Information reuse, integration, and reusable systems. Inf. Syst. Frontiers 16(5): 749-752 (2014) - [j255]Hua Wang
, Lili Sun, Elisa Bertino:
Building access control policy model for privacy preserving and testing policy conflicting problems. J. Comput. Syst. Sci. 80(8): 1493-1503 (2014) - [j254]Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu:
A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3): 481-501 (2014) - [j253]Seung-Hyun Seo
, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim:
Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38: 43-53 (2014) - [j252]Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
IdentiDroid: Android can finally Wear its Anonymous Suit. Trans. Data Priv. 7(1): 27-50 (2014) - [j251]Mohamed Nabeel, Elisa Bertino:
Attribute Based Group Key Management. Trans. Data Priv. 7(3): 309-336 (2014) - [j250]Elisa Bertino:
Editorial. IEEE Trans. Dependable Secur. Comput. 11(1): 1 (2014) - [j249]Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing
:
Private Searching on Streaming Data Based on Keyword Frequency. IEEE Trans. Dependable Secur. Comput. 11(2): 155-167 (2014) - [j248]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino:
Privacy-Preserving and Content-Protecting Location Based Queries. IEEE Trans. Knowl. Data Eng. 26(5): 1200-1210 (2014) - [j247]Mohamed R. Fouad, Khaled M. Elbassioni
, Elisa Bertino:
A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization. IEEE Trans. Knowl. Data Eng. 26(7): 1591-1601 (2014) - [j246]Seung-Hyun Seo
, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2107-2119 (2014) - [j245]Mohamed Nabeel, Elisa Bertino:
Privacy Preserving Delegated Access Control in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2268-2280 (2014) - [j244]Sunoh Choi, Gabriel Ghinita, Hyo-Sang Lim, Elisa Bertino:
Secure kNN Query Processing in Untrusted Cloud Environments. IEEE Trans. Knowl. Data Eng. 26(11): 2818-2831 (2014) - [c477]Dongxi Liu, Elisa Bertino, Xun Yi:
Privacy of outsourced k-means clustering. AsiaCCS 2014: 123-134 - [c476]Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino:
Demo Overview: Privacy-Enhancing Features of IdentiDroid. CCS 2014: 1481-1483 - [c475]Asmaa Sallam, Elisa Bertino:
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs. CCS 2014: 1493-1495 - [c474]Seung-Hyun Seo
, Jongho Won, Elisa Bertino:
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. CODASPY 2014: 143-146 - [c473]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor:
Security of graph data: hashing schemes and definitions. CODASPY 2014: 223-234 - [c472]Elisa Bertino, Bharath Kumar Samanthula:
Security with privacy - A research agenda. CollaborateCom 2014: 144-153 - [c471]Elisa Bertino:
Security with Privacy - Opportunities and Challenges: Panel Position Paper. COMPSAC 2014: 436-437 - [c470]Sorin Adam Matei
, Wutao Tan, Michael Yu Zhu, Chuanhai Liu, Elisa Bertino, Jeremy Foote
:
Elite size and resilience impact on global system structuration in social media. CTS 2014: 9-10 - [c469]Nariman Ammar, Zaki Malik
, Elisa Bertino, Abdelmounaam Rezgui:
Dynamic Privacy Policy Management in Services-Based Interactions. DEXA (2) 2014: 248-262 - [c468]Elisa Bertino:
Data Trustworthiness - Approaches and Research Challenges. DPM/SETOP/QASA 2014: 17-25 - [c467]Xun Yi, Feng Hao
, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - [c466]Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino:
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data. ESORICS (1) 2014: 400-418 - [c465]Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
Secure mutual proximity zone enclosure evaluation. SIGSPATIAL/GIS 2014: 133-142 - [c464]Alfredo Cuzzocrea
, Elisa Bertino:
Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms. HAIS 2014: 439-453 - [c463]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan
:
Practical k nearest neighbor queries with location privacy. ICDE 2014: 640-651 - [c462]Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:
Secure data provenance compression using arithmetic coding in wireless sensor networks. IPCCC 2014: 1-10 - [c461]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Provenance-aware security risk analysis for hosts and network flows. NOMS 2014: 1-8 - [c460]Hasini Gunasinghe, Elisa Bertino:
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. NSS 2014: 389-408 - [c459]Alfredo Cuzzocrea, Elisa Bertino:
A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP. OTM Workshops 2014: 117-136 - [c458]Bilal Shebaro, Daniele Midi, Elisa Bertino:
Fine-grained analysis of packet losses in wireless sensor networks. SECON 2014: 320-328 - [c457]Salmin Sultana, Daniele Midi, Elisa Bertino:
Kinesis: a security incident response and prevention system for wireless sensor networks. SenSys 2014: 148-162 - [e37]Elisa Bertino, Ravi S. Sandhu, Jaehong Park:
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2 [contents] - [e36]Elisa Bertino, Shu-Ching Chen, Karl Aberer, Prashant Krishnamurthy, Murat Kantarcioglu:
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014. ICST / IEEE 2014, ISBN 978-1-63190-043-3 [contents] - [e35]Isabel F. Cruz, Elena Ferrari, Yufei Tao, Elisa Bertino, Goce Trajcevski:
IEEE 30th International Conference on Data Engineering, Chicago, ICDE 2014, IL, USA, March 31 - April 4, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3480-5 [contents] - [e34]James Joshi, Elisa Bertino, Bhavani Thuraisingham, Ling Liu:
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, IRI 2014, Redwood City, CA, USA, August 13-15, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5880-1 [contents] - [i15]Bharath K. Samanthula, Wei Jiang, Elisa Bertino:
Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases. CoRR abs/1401.3768 (2014) - [i14]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-User k-Means Clustering. CoRR abs/1412.4378 (2014) - [i13]Wei Jiang, Dan Lin, Feng Li, Elisa Bertino:
Randomized and Efficient Authentication in Mobile Environments. IACR Cryptol. ePrint Arch. 2014: 86 (2014) - 2013
- [b8]Yingjiu Li, Robert H. Deng
, Elisa Bertino:
RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01212-9 - [b7]Xun Yi, Russell Paulet, Elisa Bertino:
Private Information Retrieval. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627051538, pp. 1-114 - [j243]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan
, Gail-Joon Ahn
, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2): 76-84 (2013) - [j242]Ashish Kundu, Elisa Bertino:
Privacy-preserving authentication of trees and graphs. Int. J. Inf. Sec. 12(6): 467-494 (2013) - [j241]Mohammad Allahbakhsh, Boualem Benatallah
, Aleksandar Ignjatovic, Hamid R. Motahari Nezhad, Elisa Bertino, Schahram Dustdar
:
Quality Control in Crowdsourcing Systems: Issues and Directions. IEEE Internet Comput. 17(2): 76-81 (2013) - [j240]Rimma V. Nehme, Karen E. Works, Chuan Lei
, Elke A. Rundensteiner, Elisa Bertino:
Multi-route query processing and optimization. J. Comput. Syst. Sci. 79(3): 312-329 (2013) - [j239]Fang-Yu Rao, Jianneng Cao, Mehmet Kuzu, Elisa Bertino, Murat Kantarcioglu:
Efficient Tree Pattern Queries On Encrypted XML Documents. Trans. Data Priv. 6(3): 199-226 (2013) - [j238]Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang:
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. IEEE Trans. Inf. Forensics Secur. 8(6): 949-962 (2013) - [j237]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Agent-based accountable grid computing systems. J. Supercomput. 65(2): 903-929 (2013) - [j236]Xun Yi, Md. Golam Kaosar, Russell Paulet, Elisa Bertino:
Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Trans. Knowl. Data Eng. 25(5): 1125-1134 (2013) - [j235]Salmin Sultana, Mohamed Shehab
, Elisa Bertino:
Secure Provenance Transmission for Streaming Data. IEEE Trans. Knowl. Data Eng. 25(8): 1890-1903 (2013) - [j234]Dan Lin, Prathima Rao, Rodolfo Ferrini, Elisa Bertino, Jorge Lobo
:
A Similarity Measure for Comparing XACML Policies. IEEE Trans. Knowl. Data Eng. 25(9): 1946-1959 (2013) - [j233]Mohamed Nabeel, Ning Shang, Elisa Bertino:
Privacy Preserving Policy-Based Content Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 25(11): 2602-2614 (2013) - [j232]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Security-Aware Service Composition with Fine-Grained Information Flow Control. IEEE Trans. Serv. Comput. 6(3): 330-343 (2013) - [c456]Lili Sun, Hua Wang, Elisa Bertino:
Role-based access control to outsourced data in could computing. ADC 2013: 119-128 - [c455]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah
, Amin Beheshti
, Elisa Bertino, Norman Foo:
Collusion Detection in Online Rating Systems. APWeb 2013: 196-207 - [c454]Leon Reznik
, Elisa Bertino:
Data quality evaluation: integrating security and accuracy. CCS 2013: 1367-1370 - [c453]Bilal Shebaro, Di Jin, Elisa Bertino:
Performance signatures of mobile phone browsers. CCS 2013: 1407-1410 - [c452]Sunoh Choi, Christopher N. Gutierrez, Hyo-Sang Lim, Saurabh Bagchi, Elisa Bertino:
Secure and resilient proximity-based access control. DARE@CIKM 2013: 15-20 - [c451]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A secure architecture design based on application isolation, code minimization and randomization. CNS 2013: 423-429 - [c450]Salmin Sultana, Elisa Bertino:
A file provenance system. CODASPY 2013: 153-156 - [c449]Seung-Hyun Seo
, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An efficient certificateless cryptography scheme without pairing. CODASPY 2013: 181-184 - [c448]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: continuous access control enforcement in dynamic data stream environments. CODASPY 2013: 243-254 - [c447]Anna Cinzia Squicciarini
, Giuseppe Petracca, Elisa Bertino:
Adaptive data protection in distributed systems. CODASPY 2013: 365-376 - [c446]Elisa Bertino, Dimitrios Georgakopoulos:
Preface. CollaborateCom 2013 - [c445]Alfredo Cuzzocrea
, Elisa Bertino:
Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework. COMPSAC 2013: 234-239 - [c444]Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang:
Efficient General Policy Decision by Using Mutable Variable Aware Cache. COMPSAC 2013: 359-368 - [c443]Elisa Bertino:
Big Data - Opportunities and Challenges Panel Position Paper. COMPSAC 2013: 479-480 - [c442]Jianneng Cao, Fang-Yu Rao, Mehmet Kuzu, Elisa Bertino, Murat Kantarcioglu:
Efficient tree pattern queries on encrypted XML documents. EDBT/ICDT Workshops 2013: 111-120 - [c441]Mehmet Kuzu, Murat Kantarcioglu, Ali Inan
, Elisa Bertino, Elizabeth Durham, Bradley A. Malin
:
Efficient privacy-aware record integration. EDBT 2013: 167-178 - [c440]Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan
:
Efficient and accurate strategies for differentially-private sliding window queries. EDBT 2013: 191-202 - [c439]Bilal Shebaro, Asmaa Sallam, Ashish Kamra, Elisa Bertino:
PostgreSQL anomalous query detector. EDBT 2013: 741-744 - [c438]Xun Yi, Yuan Miao
, Elisa Bertino, Jan Willemson
:
Multiparty privacy protection for electronic health records. GLOBECOM 2013: 2730-2735 - [c437]Eduard C. Dragut, Peter Baker, Jia Xu, Muhammad I. Sarfraz, Elisa Bertino, Amgad Madkour, Raghu Agarwal, Ahmed R. Mahmood, Sangchun Han:
CRIS - Computational research infrastructure for science. IRI 2013: 301-308 - [c436]Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini
, Elisa Bertino:
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. NSS 2013: 94-108 - [c435]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. NSS 2013: 293-306 - [c434]Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann:
Privacy Preserving Context Aware Publish Subscribe Systems. NSS 2013: 465-478 - [c433]Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino:
A Comprehensive Access Control System for Scientific Applications. NSS 2013: 749-755 - [c432]Daniele Midi, Ashish Kundu, Elisa Bertino:
Towards Authenticated Objects. NSS 2013: 777-783 - [c431]Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:
Private data warehouse queries. SACMAT 2013: 25-36 - [c430]Elisa Bertino:
Data Security - Challenges and Research Opportunities. Secure Data Management 2013: 9-13 - [c429]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. SenSys 2013: 30:1-30:2 - [c428]Bilal Shebaro, Daniele Midi, Elisa Bertino:
Fine-grained analysis of packet loss symptoms in wireless sensor networks. SenSys 2013: 38:1-38:2 - [c427]Seung-Hyun Seo
, Xiaoyu Ding, Elisa Bertino:
Encryption key management for secure communication in smart advanced metering infrastructures. SmartGridComm 2013: 498-503 - [e33]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 [contents] - [e32]Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli:
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE 2013, ISBN 978-1-936968-92-3 [contents] - 2012
- [b6]Elisa Bertino:
Data Protection from Insider Threats. Synthesis Lectures on Data Management, Morgan & Claypool Publishers 2012, ISBN 978-3-031-00762-0 - [j231]Omar Hasan, Lionel Brunie, Elisa Bertino:
Preserving privacy of feedback providers in decentralized reputation systems. Comput. Secur. 31(7): 816-826 (2012) - [j230]Mohamed Nabeel, Elisa Bertino:
Privacy-Preserving Fine-Grained Access Control in Public Clouds. IEEE Data Eng. Bull. 35(4): 21-30 (2012) - [j229]Weili Han, Ye Cao, Elisa Bertino, Jianming Yong
:
Using automated individual white-list to protect web digital identities. Expert Syst. Appl. 39(15): 11861-11869 (2012) - [j228]Md. Enamul Kabir
, Hua Wang
, Elisa Bertino:
A role-involved purpose-based access control model. Inf. Syst. Frontiers 14(3): 809-822 (2012) - [j227]James Joshi, Elisa Bertino, Calton Pu, Heri Ramampiaro:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(3): 325-326 (2012) - [j226]Ilsun You, Gabriele Lenzini, Marek R. Ogiela
, Elisa Bertino:
Defending against insider threats and internal data leakage. Secur. Commun. Networks 5(8): 831-833 (2012) - [j225]Anna Cinzia Squicciarini
, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
A Flexible Approach to Multisession Trust Negotiations. IEEE Trans. Dependable Secur. Comput. 9(1): 16-29 (2012) - [j224]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Resilient Authenticated Execution of Critical Applications in Untrusted Environments. IEEE Trans. Dependable Secur. Comput. 9(4): 597-609 (2012) - [j223]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Enforcement of Spatially Aware RBAC. IEEE Trans. Dependable Secur. Comput. 9(5): 627-640 (2012) - [j222]Ali Inan
, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino:
A Hybrid Approach to Private Record Matching. IEEE Trans. Dependable Secur. Comput. 9(5): 684-698 (2012) - [j221]Paolo Atzeni
, Elisa Bertino, Masaru Kitsuregawa, Kian-Lee Tan
:
Special issue: best papers of VLDB 2010. VLDB J. 21(2): 167-168 (2012) - [c426]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: making it harder to fish for gadgets. CCS 2012: 1016-1018 - [c425]Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Gopavaram, Elisa Bertino:
Demonstrating a lightweight data provenance for sensor networks. CCS 2012: 1022-1024 - [c424]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data management for self-protecting objects in cloud computing systems. CNSM 2012: 140-144 - [c423]Ninghui Li, Haining Chen, Elisa Bertino:
On practical specification and enforcement of obligations. CODASPY 2012: 71-82 - [c422]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Leakage-free redactable signatures. CODASPY 2012: 307-316 - [c421]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. CollaborateCom 2012: 1-10 - [c420]Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino:
Privacy-preserving assessment of social network data trustworthiness. CollaborateCom 2012: 97-106 - [c419]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah
, Amin Beheshti
, Elisa Bertino, Norman Foo:
Reputation management in crowdsourcing systems. CollaborateCom 2012: 664-671 - [c418]Alfredo Cuzzocrea
, Elisa Bertino, Domenico Saccà
:
Towards a theory for privacy preserving distributed OLAP. EDBT/ICDT Workshops 2012: 221-226 - [c417]Salmin Sultana, Elisa Bertino:
A Comprehensive Model for Provenance. ER Workshops 2012: 121-130 - [c416]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino:
Privacy-Preserving and Content-Protecting Location Based Queries. ICDE 2012: 44-53 - [c415]Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, Murat Kantarcioglu:
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks. ICDE 2012: 1192-1203 - [c414]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab
:
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. ICPADS 2012: 101-108 - [c413]Salmin Sultana, Elisa Bertino:
A Comprehensive Model for Provenance. IPAW 2012: 243-245 - [c412]Gordon K. Lee, Elisa Bertino, Stuart Harvey Rubin, Taghi M. Khoshgoftaar, Bhavani Thuraisingham, James D. McCaffrey:
Panel: Using information re-use and integration principles in big data. IRI 2012 - [c411]Mohamed Nabeel, Elisa Bertino:
Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652 - [c410]Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
Secure sensor network SUM aggregation with detection of malicious nodes. LCN 2012: 19-27 - [c409]Rafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino:
Emerging trends around big data analytics and security: panel. SACMAT 2012: 67-68 - [c408]Mohamed Nabeel, Ning Shang, Elisa Bertino:
Efficient privacy preserving content based publish subscribe systems. SACMAT 2012: 133-144 - [c407]Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino:
A framework for verification and optimal reconfiguration of event-driven role based access control policies. SACMAT 2012: 197-208 - [c406]Mohamed Nabeel, Sam Kerr, Xiaoyu Ding, Elisa Bertino:
Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions. SmartGridComm 2012: 324-329 - [c405]Mohamed R. Fouad, Khaled M. Elbassioni
, Elisa Bertino:
Modeling the Risk & Utility of Information Sharing in Social Networks. SocialCom/PASSAT 2012: 441-450 - [c404]Sunoh Choi, Hyo-Sang Lim, Elisa Bertino:
Authenticated Top-K Aggregation in Distributed and Outsourced Databases. SocialCom/PASSAT 2012: 779-788 - [c403]Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino:
On XACML's Adequacy to Specify and to Enforce HIPAA. HealthSec 2012 - [e31]Elisa Bertino, Ravi S. Sandhu:
Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012. ACM 2012, ISBN 978-1-4503-1091-8 [contents] - [e30]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1990-4 [contents] - [e29]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2714-5 [contents] - [e28]Chengcui Zhang, James Joshi, Elisa Bertino, Bhavani Thuraisingham:
IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012. IEEE 2012, ISBN 978-1-4673-2282-9 [contents] - [e27]Li Xu, Elisa Bertino, Yi Mu:
Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2 [contents] - [i12]Mohamed Nabeel, John Zage, Sam Kerr, Elisa Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, Michael Duren:
Cryptographic Key Management for Smart Power Grids - Approaches and Issues. CoRR abs/1206.3880 (2012) - [i11]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
Detecting, Representing and Querying Collusion in Online Rating Systems. CoRR abs/1211.0963 (2012) - [i10]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
An Analytic Approach to People Evaluation in Crowdsourcing Systems. CoRR abs/1211.3200 (2012) - [i9]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Efficient Leakage-free Authentication of Trees, Graphs and Forests. IACR Cryptol. ePrint Arch. 2012: 36 (2012) - [i8]Ashish Kundu, Elisa Bertino:
On Hashing Graphs. IACR Cryptol. ePrint Arch. 2012: 352 (2012) - 2011
- [j220]Md. Enamul Kabir
, Hua Wang
, Elisa Bertino:
Efficient systematic clustering method for k-anonymization. Acta Informatica 48(1): 51-66 (2011) - [j219]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo
:
Fine-grained integration of access control policies. Comput. Secur. 30(2-3): 91-107 (2011) - [j218]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. Comput. Stand. Interfaces 33(1): 13-23 (2011) - [j217]Md. Enamul Kabir
, Hua Wang
, Elisa Bertino:
A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3): 1482-1489 (2011) - [j216]Elisa Bertino, Gabriel Ghinita, Ashish Kamra:
Access Control for Databases: Concepts and Systems. Found. Trends Databases 3(1-2): 1-148 (2011) - [j215]Gabriel Ghinita, Panos Kalnis
, Murat Kantarcioglu, Elisa Bertino:
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. GeoInformatica 15(4): 699-726 (2011) - [j214]Alfredo Cuzzocrea
, Elisa Bertino:
Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach. J. Comput. Syst. Sci. 77(6): 965-987 (2011) - [j213]Daniel G. Aliaga, Elisa Bertino, Stefano Valtolina:
DECHO - a framework for the digital exploration of cultural heritage objects. ACM Journal on Computing and Cultural Heritage 3(3): 12:1-12:26 (2011) - [j212]Md. Enamul Kabir
, Hua Wang
, Elisa Bertino:
A Conditional Role-Involved Purpose-Based Access Control Model. J. Organ. Comput. Electron. Commer. 21(1): 71-91 (2011) - [j211]Maria Luisa Damiani, Claudio Silvestri
, Elisa Bertino:
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications. IEEE Pervasive Comput. 10(4): 64-72 (2011) - [j210]Alberto Trombetta
, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privacy-Preserving Updates to Anonymous and Confidential Databases. IEEE Trans. Dependable Secur. Comput. 8(4): 578-587 (2011) - [j209]Yuqing Sun
, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Secur. Comput. 8(6): 883-897 (2011) - [j208]Ashish Kamra, Elisa Bertino:
Design and Implementation of an Intrusion Response System for Relational Databases. IEEE Trans. Knowl. Data Eng. 23(6): 875-888 (2011) - [j207]Federica Paci
, Massimo Mecella
, Mourad Ouzzani, Elisa Bertino:
ACConv - An Access Control Model for Conversational Web Services. ACM Trans. Web 5(3): 13:1-13:33 (2011) - [c402]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems. CCGRID 2011: 534-543 - [c401]Elisa Bertino, Gabriel Ghinita:
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper. AsiaCCS 2011: 10-19 - [c400]Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino:
PUF ROKs: a hardware approach to read-once keys. AsiaCCS 2011: 155-164 - [c399]Mohamed Nabeel, Elisa Bertino:
Poster: towards attribute based group key management. CCS 2011: 821-824 - [c398]Mohamed Nabeel, Elisa Bertino, Murat Kantarcioglu, Bhavani Thuraisingham:
Towards privacy preserving access control in the cloud. CollaborateCom 2011: 172-180 - [c397]Robert K. Abercrombie
, Frederick T. Sheldon
, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne:
Secure cryptographic key management system (CKMS) considerations for smart grid devices. CSIIRW 2011: 59 - [c396]Elisa Bertino, Michael S. Kirkpatrick:
Location-based access control systems for mobile users: concepts and research directions. SPRINGL 2011: 49-52 - [c395]Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Privacy-preserving assessment of location data trustworthiness. GIS 2011: 231-240 - [c394]Michael S. Kirkpatrick, Maria Luisa Damiani, Elisa Bertino:
Prox-RBAC: a proximity-based spatially aware RBAC. GIS 2011: 339-348 - [c393]Xukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li:
A New Approach to Weighted Multi-Secret Sharing. ICCCN 2011: 1-6 - [c392]Ashish Kundu, Elisa Bertino:
A New Class of Buffer Overflow Attacks. ICDCS 2011: 730-739 - [c391]Salmin Sultana, Elisa Bertino, Mohamed Shehab
:
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. ICDCS Workshops 2011: 332-338 - [c390]Nan Guo, Tianhan Gao, Bin Zhang, Ruchith Fernando, Elisa Bertino:
Aggregated Privacy-Preserving Identity Verification for Composite Web Services. ICWS 2011: 692-693 - [c389]Elisa Bertino:
Protecting information systems from insider threats - concepts and issues. IRI 2011 - [c388]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Profile-Based Selection of Accountability Policies in Grid Computing Systems. POLICY 2011: 145-148 - [c387]Qun Ni, Elisa Bertino:
xfACL: an extensible functional language for access control. SACMAT 2011: 61-72 - [c386]Xun Yi, Elisa Bertino:
Private searching for single and conjunctive keywords on streaming data. WPES 2011: 153-158 - [e26]Ravi S. Sandhu, Elisa Bertino:
First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0466-5 [contents] - [e25]Elisa Bertino, Maria Luisa Damiani, Gabriel Ghinita:
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2011, November 1st, 2011, Chicago, IL, USA. ACM 2011, ISBN 978-1-4503-1032-1 [contents] - [e24]Sadagopan Srinivasan, Krithi Ramamritham, Arun Kumar, M. P. Ravindra, Elisa Bertino, Ravi Kumar:
Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011. ACM 2011, ISBN 978-1-4503-0632-4 [contents] - [e23]Sadagopan Srinivasan, Krithi Ramamritham, Arun Kumar, M. P. Ravindra, Elisa Bertino, Ravi Kumar:
Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011 (Companion Volume). ACM 2011, ISBN 978-1-4503-0637-9 [contents] - 2010
- [b5]Elisa Bertino, Lorenzo Martino, Federica Paci
, Anna Cinzia Squicciarini
:
Security for Web Services and Service-Oriented Architectures. Springer 2010, ISBN 978-3-540-87741-7, pp. I-XII, 1-226 - [j206]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo
:
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010) - [j205]Elisa Bertino, Andrea Maurino, Monica Scannapieco:
Guest Editors' Introduction: Data Quality in the Internet Era. IEEE Internet Comput. 14(4): 11-13 (2010) - [j204]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
The PROBE Framework for the Personalized Cloaking of Private Locations. Trans. Data Priv. 3(2): 123-148 (2010) - [j203]Qun Ni, Elisa Bertino, Jorge Lobo
, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta
:
Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3): 24:1-24:31 (2010) - [j202]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo
:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - [j201]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
Group-Based Negotiations in P2P Systems. IEEE Trans. Parallel Distributed Syst. 21(10): 1473-1486 (2010) - [j200]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Rui Xue, Elisa Bertino:
Multifactor Identity Verification Using Aggregated Proof of Knowledge. IEEE Trans. Syst. Man Cybern. Part C 40(4): 372-383 (2010) - [j199]Elisa Bertino, Elena Ferrari
, Andrea Perego
:
A General Framework for Web Content Filtering. World Wide Web 13(3): 215-249 (2010) - [c385]Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxiang Chi:
Systematic clustering method for l-diversity model. ADC 2010: 93-102 - [c384]Qun Ni, Elisa Bertino, Jorge Lobo
:
Risk-based access control systems built on fuzzy inferences. AsiaCCS 2010: 250-260 - [c383]Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino:
Controlling data disclosure in computational PIR protocols. AsiaCCS 2010: 310-313 - [c382]Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, Elisa Bertino:
A selective encryption approach to fine-grained access control for P2P file sharing. CollaborateCom 2010: 1-10 - [c381]Hyo-Sang Lim, Chenyun Dai, Elisa Bertino:
A policy-based approach for assuring data integrity in DBMSs. CollaborateCom 2010: 1-10 - [c380]Eiji Kawai, Elisa Bertino, Sue Moon:
Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet. COMPSAC 2010: 21 - [c379]Jianming Yong
, Elisa Bertino:
Digital identity enrolment and assurance support for VeryIDX. CSCWD 2010: 734-739 - [c378]Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr:
PUF ROKs: generating read-once keys from physically unclonable functions. CSIIRW 2010: 19 - [c377]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey. CSIIRW 2010: 54 - [c376]Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, Elisa Bertino:
Publishing Time-Series Data under Preservation of Privacy and Distance Orders. DEXA (2) 2010: 17-31 - [c375]Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations. DEXA (1) 2010: 368-384 - [c374]Eun-Ae Cho, Gabriel Ghinita, Elisa Bertino:
Privacy-preserving similarity measurement for access control policies. Digital Identity Management 2010: 3-12 - [c373]Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino:
Privacy preserving identity attribute verification in windows cardspace. Digital Identity Management 2010: 13-16 - [c372]Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino:
Provenance-based trustworthiness assessment in sensor networks. DMSN 2010: 2-7 - [c371]Ali Inan
, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino:
Private record matching using differential privacy. EDBT 2010: 123-134 - [c370]Ashish Kundu, Elisa Bertino:
How to authenticate graphs without leaking. EDBT 2010: 609-620 - [c369]Gabriel Ghinita, Carmen Ruiz Vicente, Ning Shang, Elisa Bertino:
Privacy-preserving matching of spatial datasets with protection against background knowledge. GIS 2010: 3-12 - [c368]Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
PEAR: a hardware based protocol authentication system. SPRINGL 2010: 18-25 - [c367]Maria Luisa Damiani, Claudio Silvestri
, Elisa Bertino:
Analyzing semantic locations cloaking techniques in a probabilistic grid-based map. GIS 2010: 522-523 - [c366]Qun Ni, Elisa Bertino:
Credibility-enhanced curated database: Improving the value of curated databases. ICDE 2010: 784-795 - [c365]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: Continuous access control enforcement in dynamic data stream environments. ICDE 2010: 940-943 - [c364]Ning Shang, Mohamed Nabeel, Federica Paci
, Elisa Bertino:
A privacy-preserving approach to policy-based content dissemination. ICDE 2010: 944-955 - [c363]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Policy-Driven Service Composition with Information Flow Control. ICWS 2010: 50-57 - [c362]Ning Shang, Federica Paci
, Elisa Bertino:
Efficient and privacy-preserving enforcement of attribute-based access control. IDtrust 2010: 63-68 - [c361]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino, Xiangwei Kong, Weike Zhang:
Biometrics-based identifiers for digital identity management. IDtrust 2010: 84-96 - [c360]Md. Enamul Kabir
, Hua Wang, Elisa Bertino:
A Role-Involved Conditional Purpose-Based Access Control Model. EGES/GISP 2010: 167-180 - [c359]