Search For:

Displaying 1-50 out of 308 total
Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems
Found in: IEEE Transactions on Services Computing
By Elisa Bertino, William Cheng-Chung Chu
Issue Date:July 2009
pp. 245-246
No summary available.
 
Policies models and tools for collaborative applications
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By Elisa Bertino
Issue Date:November 2007
pp. 506
Policies are at the heart of any assured information sharing infrastructure for collaborative applications and may include those for access control, trust and accountability. Policies can be a key component in deciding what and how much to reveal in the di...
 
Guest Editorial: Introduction to the Special Section
Found in: IEEE Transactions on Knowledge and Data Engineering
By Elisa Bertino, Richard Muntz, Thomas Rakow
Issue Date:January 2000
pp. 58-59
No summary available.
 
Privacy Preserving Delegated Access Control in Public Clouds
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mohamed Nabeel,Elisa Bertino
Issue Date:September 2014
pp. 2268-2280
Current approaches to enforce fine-grained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud ...
 
Editor's Note
Found in: IEEE Transactions on Dependable and Secure Computing
By Elisa Bertino
Issue Date:May 2014
pp. 207-208
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
   
Editorial
Found in: IEEE Transactions on Dependable and Secure Computing
By Elisa Bertino
Issue Date:January 2014
pp. 1
No summary available.
 
Privacy Preserving Policy-Based Content Sharing in Public Clouds
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mohamed Nabeel,Ning Shang,Elisa Bertino
Issue Date:November 2013
pp. 2602-2614
An important problem in public clouds is how to selectively share documents based on fine-grained attribute-based access control policies (acps). An approach is to encrypt documents satisfying different policies with different keys using a public key crypt...
 
Security in SOA and Web Services
Found in: Services Computing, IEEE International Conference on
By Elisa Bertino, Lorenzo Martino
Issue Date:September 2006
pp. xli
Security is today a relevant requirement for any distributed application, and in particular for these enabled by the Web such as e-health, e-commerce, and e-learning. It is thus crucial that the use of Web services, stand-alone or composed, provide strong ...
   
Policies and IT Technologies: A Puzzle of Two Pieces
Found in: IEEE Internet Computing
By Elisa Bertino, Steve Ruth
Issue Date:January 2006
pp. 65-67
This new public policy technology track will appear in each installment of <em>IEEE Internet Computing</em> in 2006 and will cover a wide range of topics. The authors describe their vision of what to expect in future issues along with a call to...
 
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Found in: Distributed Computing Systems, International Conference on
By Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elena Ferrari
Issue Date:June 2005
pp. 314-323
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ensure that data, when moving among different parties, are modified only accordin...
 
Static Analysis of Logical Languages with Deferred Update Semantics
Found in: IEEE Transactions on Knowledge and Data Engineering
By Barbara Catania, Elisa Bertino
Issue Date:March 2003
pp. 386-404
<p><b>Abstract</b>—Static analysis of declarative languages deals with the detection, at compile time, of program properties that can be used to better understand the program semantics and to improve the efficiency of program evaluation. ...
 
An Access Control Mechanism for Large Scale Data Dissemination Systems
Found in: Research Issues in Data Engineering, International Workshop on
By Elisa Bertino, Elena Ferrari, Evaggelia Pitoura
Issue Date:April 2001
pp. 0043
Abstract: Automatic data dissemination systems are becoming increasingly relevant in internet-based information systems. In such systems, users subscribe to the dissemination service by providing interest profiles. These profiles are then used to determine...
 
Guest Editorial: Introduction to the Special Section
Found in: IEEE Transactions on Knowledge and Data Engineering
By Elisa Bertino, Susan D. Urban
Issue Date:January 2000
pp. 1-2
No summary available.
 
A Conceptual Annotation Approach to Indexing in a Web-Based Information System
Found in: Advanced Issues of E-Commerce and Web-Based Information Systems, International Workshop on
By Elisa Bertino, Barbara Catania, Gian Piero Zarri
Issue Date:April 1999
pp. 160
All the specialists have agreed that the possibility of adding to multimedia WWW objects some sort of `conceptual' annotations describing their information content would greatly contribute to solve the problem of their `intelligent' indexing and retrieval....
 
Information Flow Control in Object-Oriented Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia
Issue Date:July 1997
pp. 524-538
<p><b>Abstract</b>—In this paper, we describe a high assurance discretionary access control model for object-oriented systems. The model not only ensures protection against Trojan horses leaking information, but provides the flexibility o...
 
Collecting Garbage in Multilevel Secure Object Stores
Found in: Security and Privacy, IEEE Symposium on
By Elisa Bertino, Luigi V., Luigi V. Mancini, Sushil Jajodia
Issue Date:May 1994
pp. 106
This paper addresses the problem of garbage collection in persistent object stores that are multilevel. The proposed approach is able to preserve referential integrity, while ensuring that security is not violated. In the paper, we first discuss some gener...
 
Secure kNN Query Processing in Untrusted Cloud Environments
Found in: IEEE Transactions on Knowledge and Data Engineering
By Sunoh Choi,Gabriel Ghinita,Hyo-Sang Lim,Elisa Bertino
Issue Date:November 2014
pp. 2818-2831
Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, ca...
 
Privacy-Preserving and Content-Protecting Location Based Queries
Found in: IEEE Transactions on Knowledge and Data Engineering
By Russell Paulet,Md Golam Kaosar, Xun Yi,Elisa Bertino
Issue Date:May 2014
pp. 1-1
In this paper we present a solution to one of the location-based query problems. This problem is defined as follows: (i) a user wants to query a database of location data, known as Points Of Interest (POIs), and does not want to reveal his/her location to ...
 
Private Searching on Streaming Data Based on Keyword Frequency
Found in: IEEE Transactions on Dependable and Secure Computing
By Xun Yi,Elisa Bertino,Jaideep Vaidya,Chaoping Xing
Issue Date:March 2014
pp. 155-167
Private searching on streaming data is a process to dispatch to a public server a program, which searches streaming sources of data without revealing searching criteria and then sends back a buffer containing the findings. From an Abelian group homomorphic...
 
Identity, Privacy, and Deception in Social Networks
Found in: IEEE Internet Computing
By Elisa Bertino,James Caverlee,Elena Ferrari
Issue Date:March 2014
pp. 7-9
This special issue focuses on new risks and growing concerns centered around identity, privacy, and deception in the context of Internet-enabled social networks. The four articles in this issue address a range of issues in social networks and can serve as ...
   
A Similarity Measure for Comparing XACML Policies
Found in: IEEE Transactions on Knowledge and Data Engineering
By Dan Lin,Prathima Rao,Rodolfo Ferrini,Elisa Bertino,Jorge Lobo
Issue Date:September 2013
pp. 1946-1959
Assessing similarity of policies is crucial in a variety of scenarios, such as finding the cloud service providers which satisfy users' privacy concerns, or finding collaborators which have matching security and privacy settings. Existing approaches to pol...
 
Secure Provenance Transmission for Streaming Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Salmin Sultana,Mohamed Shehab,Elisa Bertino
Issue Date:August 2013
pp. 1890-1903
Many application domains, such as real-time financial analysis, e-healthcare systems, sensor networks, are characterized by continuous data streaming from multiple sources and through intermediate processing by multiple aggregators. Keeping track of data p...
 
Security-Aware Service Composition with Fine-Grained Information Flow Control
Found in: IEEE Transactions on Services Computing
By Wei She,I-Ling Yen,Bhavani Thuraisingham,Elisa Bertino
Issue Date:July 2013
pp. 330-343
Enforcing access control in composite services is essential in distributed multidomain environment. Many advanced access control models have been developed to secure web services at execution time. However, they do not consider access control validation at...
 
Single-Database Private Information Retrieval from Fully Homomorphic Encryption
Found in: IEEE Transactions on Knowledge and Data Engineering
By Xun Yi,Mohammed Golam Kaosar,Russell Paulet,Elisa Bertino
Issue Date:May 2013
pp. 1125-1134
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit database without revealing to the database server the value of $(i)$. In this paper, we present a PIR protocol with the communication complexity of $(O(\gamma \lo...
 
Collaboration in Multicloud Computing Environments: Framework and Security Issues
Found in: Computer
By Mukesh Singhal,Santosh Chandrasekhar,Tingjian Ge,Ravi Sandhu,Ram Krishnan,Gail-Joon Ahn,Elisa Bertino
Issue Date:February 2013
pp. 76-84
A proposed proxy-based multicloud computing framework allows dynamic, on-the-fly collaborations and resource sharing among cloud-based services, addressing trust, policy, and privacy issues without preestablished collaboration agreements or standardized in...
 
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Salmin Sultana,Gabriel Ghinita,Elisa Bertino,Mohamed Shehab
Issue Date:December 2012
pp. 101-108
Large-scale sensor networks are being deployed in numerous application domains, and often the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that agg...
 
Secure sensor network SUM aggregation with detection of malicious nodes
Found in: 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)
By Sunoh Choi,Gabriel Ghinita,Elisa Bertino
Issue Date:October 2012
pp. 19-27
In-network aggregation is an essential operation which reduces communication overhead and power consumption of resource-constrained sensor network nodes. Sensor nodes are typically organized into an aggregation tree, whereby aggregator nodes collect data f...
 
ARES Conference: Welcome Message from the ARES Conference Officers
Found in: 2012 Seventh International Conference on Availability, Reliability and Security (ARES)
By Elisa Bertino,A Min Tjoa,Gerald Quirchmayr
Issue Date:August 2012
pp. xiii
The Seventh International Conference on Availability, Reliability and Security (ARES 2012) brings together researchers and practitioners in the field of dependability. ARES 2012 highlights the various aspects of dependability, following the tradition of pr...
   
Location-aware Authentication and Authorization - Concepts and Issues
Found in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
By Elisa Bertino
Issue Date:July 2012
pp. lxiv
Summary form only given. In the talk, we first discuss motivations why taking into account location information in authentication and access control is important. Then, we survey current approaches to location-aware authentication with focus on the Auth-SL...
   
A Hybrid Approach to Private Record Matching
Found in: IEEE Transactions on Dependable and Secure Computing
By Ali Inan,Murat Kantarcioglu,Gabriel Ghinita,Elisa Bertino
Issue Date:September 2012
pp. 684-698
Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the data sets contain private informat...
 
Privacy-Preserving and Content-Protecting Location Based Queries
Found in: Data Engineering, International Conference on
By Russell Paulet,Md. Golam Koasar,Xun Yi,Elisa Bertino
Issue Date:April 2012
pp. 44-53
In this paper we present a solution to one of the location-based query problems. This problem is defined as follows: (i) a user wants to query a database of location data, known as Points Of Interest (POI), and does not want to reveal his/her location to t...
 
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks
Found in: Data Engineering, International Conference on
By Hyo-Sang Lim,Gabriel Ghinita,Elisa Bertino,Murat Kantarcioglu
Issue Date:April 2012
pp. 1192-1203
Sensor networks are being increasingly deployed in many application domains ranging from environment monitoring to supervising critical infrastructure systems (e.g., the power grid). Due to their ability to continuously collect large amounts of data, senso...
 
Resilient Authenticated Execution of Critical Applications in Untrusted Environments
Found in: IEEE Transactions on Dependable and Secure Computing
By Michael S. Kirkpatrick,Gabriel Ghinita,Elisa Bertino
Issue Date:July 2012
pp. 595-607
Modern computer systems are built on a foundation of software components from a variety of vendors. While critical applications may undergo extensive testing and evaluation procedures, the heterogeneity of software sources threatens the integrity of the ex...
 
Trusted Identities in Cyberspace
Found in: IEEE Internet Computing
By Elisa Bertino
Issue Date:January 2012
pp. 3-6
Secure and privacy-preserving digital identity management is a key requirement for secure use of the Internet and other online environments. However, the landscape of digital identity management is quite complex, with several different stakeholders. Here, ...
 
Privacy-Preserving Enforcement of Spatially Aware RBAC
Found in: IEEE Transactions on Dependable and Secure Computing
By Michael S. Kirkpatrick,Gabriel Ghinita,Elisa Bertino
Issue Date:September 2012
pp. 627-640
Several models for incorporating spatial constraints into role-based access control (RBAC) have been proposed, and researchers are now focusing on the challenge of ensuring such policies are enforced correctly. However, existing approaches have a major sho...
 
Aggregated Privacy-Preserving Identity Verification for Composite Web Services
Found in: Web Services, IEEE International Conference on
By Nan Guo,Tianhan Gao,Bin Zhang,Ruchith Fernando,Elisa Bertino
Issue Date:July 2011
pp. 692-693
An aggregated privacy-preserving identity verification scheme is proposed for composite Web services. It aggregates multiple component providers' interactions of identity verification to a single one involving the user. Besides, it protects users from priv...
 
Profile-Based Selection of Accountability Policies in Grid Computing Systems
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Wonjun Lee, Anna C. Squicciarini, Elisa Bertino
Issue Date:June 2011
pp. 145-148
Accountability in grid computing systems is an important requirement, in that it makes it possible to control activities of users and resource providers through the collection and analysis of accountability data. The accountability policies specify what to...
 
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Salmin Sultana, Elisa Bertino, Mohamed Shehab
Issue Date:June 2011
pp. 332-338
Malicious packet dropping attack is a major security threat to the data traffic in the sensor network, since it reduces the legal network throughput and may hinder the propagation of sensitive data. Dealing with this attack is challenging since the unrelia...
 
A New Class of Buffer Overflow Attacks
Found in: Distributed Computing Systems, International Conference on
By Ashish Kundu, Elisa Bertino
Issue Date:June 2011
pp. 730-739
In this paper, we focus on a class of buffer overflow vulnerabilities that occur due to the
 
A Flexible Approach to Multisession Trust Negotiations
Found in: IEEE Transactions on Dependable and Secure Computing
By Anna C. Squicciarini,Elisa Bertino,Alberto Trombetta,Stefano Braghin
Issue Date:January 2012
pp. 16-29
Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust negotiations, especially in light of th...
 
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Wonjun Lee, Anna C. Squicciarini, Elisa Bertino
Issue Date:May 2011
pp. 534-543
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made available by grid systems to attack mission-critical websites or the grid itself. In this paper, we present two approaches for protecting against attacks targeti...
 
Privacy-Preserving Updates to Anonymous and Confidential Databases
Found in: IEEE Transactions on Dependable and Secure Computing
By Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi
Issue Date:July 2011
pp. 578-587
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for ce...
 
On the Complexity of Authorization in RBAC under Qualification and Security Constraints
Found in: IEEE Transactions on Dependable and Secure Computing
By Yuqing Sun,Qihua Wang,Ninghui Li,Elisa Bertino,Mikhail (Mike) J. Atallah
Issue Date:November 2011
pp. 883-897
In practice, assigning access permissions to users must satisfy a variety of constraints motivated by business and security requirements. Here, we focus on Role-Based Access Control (RBAC) systems, in which access permissions are assigned to roles and role...
 
Design and Implementation of an Intrusion Response System for Relational Databases
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ashish Kamra, Elisa Bertino
Issue Date:June 2011
pp. 875-888
The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DB...
 
Privacy-aware role-based access control
Found in: ACM Transactions on Information and System Security (TISSEC)
By Alberto Trombeta, Alberto Trombetta, Alberto Trombetta, Carolyn Brodie, Carolyn Brodie, Clare-Marie Karat, Clare-Marie Karat, Elisa Bertino, Elisa Bertino, John Karat, John Karat, Jorge Lobo, Jorge Lobo, Qun Ni, Qun Ni
Issue Date:July 2010
pp. 1-31
In this article, we introduce a comprehensive framework supporting a privacy-aware access control mechanism, that is, a mechanism tailored to enforce access control to data containing personally identifiable information and, as such, privacy sensitive. The...
     
Guest Editors' Introduction: Data Quality in the Internet Era
Found in: IEEE Internet Computing
By Elisa Bertino, Andrea Maurino, Monica Scannapieco
Issue Date:July 2010
pp. 11-13
The vast amount of data available on the Internet introduces new challenging data quality problems, such as accessibility and usability. Low information quality is common in various Web applications, including Web 2.0 tools. Consequently, information quali...
 
JTAM - A Joint Threshold Administration Model
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Ashish Kamra, Elisa Bertino
Issue Date:July 2010
pp. 129-132
No summary available.
 
Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet
Found in: Computer Software and Applications Conference, Annual International
By Eiji Kawai, Elisa Bertino, Sue Moon
Issue Date:July 2010
pp. 21
No summary available.
 
Policy-Driven Service Composition with Information Flow Control
Found in: Web Services, IEEE International Conference on
By Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino
Issue Date:July 2010
pp. 50-57
Ensuring secure information flow is a critical task for service composition in multi-domain systems. Research in security-aware service composition provides some preliminary solutions to this problem, but there are still issues to be addressed. In this pap...
 
Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks
Found in: Mobile Data Management, IEEE International Conference on
By Gabriel Ghinita, Mehdi Azarmi, Elisa Bertino
Issue Date:May 2010
pp. 65-74
Mobile Ad-hoc Networks (MANETs) enable users in physical proximity to each other to exchange data without the need for expensive communication infrastructures. Each user represents a node in the network, and executes a neighbor discovery Typically, nodes b...
 
 1  2 Next >>