Show all resources, publications only, all other resources
Order by date title download citation
Pages 1, 2, 3, 4, 5, 6

Page 1: Showing 30 out of 156 resources

  1. Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino, "Mask: a System for Privacy-Preserving Policy Based Access to Published Content", InProceedings, Proceedings of the 2010 ACM SIGMOD Conference, January 16, 2010, 8268 downloads.
  2. Hans-Peter Kriegel, "Truth Finding and Veracity Analysis", Article, December 31, 1969, 2863 downloads.
  3. Qun ni, Elisa Bertino, Jorge Lobo, "Risk-Based Access Control Systems Built of Fuzzy Inferences", InProceedings, Proc. of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS), April 13, 2010, 2224 downloads.
  4. Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Xiaohu Li, "A Semantic Web Based Framework for Social Network Access Control", InProceedings, 14th ACM Symposium on Access Control Technologies, June 03, 2009, 1899 downloads.
  5. Rodolfo Ferrini, Elisa Bertino, "Supporting RBAC with XACML+OWL", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1506 downloads.
  6. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 11, 2008, 1480 downloads.
  7. Ninghui Li, "Access control policy comparison", Article, September 18, 2009, 1401 downloads.
  8. Onkar Walavalkar, Anupam Joshi, Tim Finin, Yelena Yesha, "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 26, 2008, 1321 downloads.
  9. Tim Oates, Tim Finin, Pranam Kolari, Deepak Chinavle, "Ensembles in Adversarial Classification for Spam", Article, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 02, 2009, 1284 downloads.
  10. Wenjia Li, Jim Parker, Anupam Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 14, 2008, 1268 downloads.
  11. Prathima Rao, Elisa Bertino, Wahbeh Qardaji, Qihua Wang, Ninghui Li, "Access Control Policy Combining: Theory Meets Practice", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1262 downloads.
  12. Yizhou Sun, Yintao Yu, Jiawei Han, "Ranking-Based Clustering of Heterogeneous Information Networks with Star Network Schema", InProceedings, Proc. 2009 ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'09), August 30, 2009, 1249 downloads.
  13. Mummoorthy Murugesan, Christopher W. Clifton, "Plausibly Deniable Search", InProceedings, Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), November 03, 2008, 1221 downloads.
  14. Xiaoxin Yin, Jiawei Han, Philip S Yu, "Truth Discovery with Multiple Conflicting Information Providers on the Web", InProceedings, IEEE Transactions on Knowledge and Data Engineering, November 30, 2008, 1192 downloads.
  15. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 01, 2008, 1141 downloads.
  16. Haimonti Dutta, et al. , "TagLearner: A P2P Classifier Learning System from Collaboratively Tagged Text Documents", InProceedings, Proceedings of the 2009 IEEE International Conference on Data Mining Workshops, December 06, 2009, 1105 downloads.
  17. Michael S. Kirkpatrick, Elisa Bertino, "Enforcing Spatial Constraints with Geo-RBAC", InProceedings, Proc. of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), June 09, 2010, 1087 downloads.
  18. Elisa Bertino, Pankaj Rohatgi, Seraphin Calo, Jorge Lobo, Qun ni, "Automating Role-based Provisioning by Learning from Examples", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1074 downloads.
  19. Ravi Sandhu, "The PEI Framework for Application-Centric Security", InProceedings, 1st International Workshop on Security and Communication Networks (IWSCN), May 20, 2009, 907 downloads.
  20. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 01, 2008, 903 downloads.
  21. Kevin K Nam, Mark S Ackerman, Lada Adamic, "Questions in, Knowledge iN? A Study of Naver’s Question Answering Community", InProceedings, Conference on Human Factors in Computing Systems, CHI 09, April 04, 2009, 875 downloads.
  22. Xiaohu Li, Paul Parker, Shouhuai Xu, "A Stochastic Model for Quantitative Security Analysis of Networked Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), February 02, 2008, 856 downloads.
  23. Murat Kantarcioglu, Robert Nix, Jaideep Vaidya, "An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining", InProceedings, 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, April 27, 2009, 786 downloads.
  24. Bolin Ding, David Lo, Jiawei Han, Siau-Cheng Khoo, "Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database", Proceedings, Proc. 2009 Int. Conf. on Data Engineering (ICDE'09), Shanghai, China, Mar. 2009, March 01, 2009, 778 downloads.
  25. Shouhuai Xu, Qun ni, Elisa Bertino, Ravi Sandhu, "A Characterization of the Problem of Secure Provenance Management", InProceedings, IEEE International Conference on Intelligence and Security Informatics (ISI-2009), June 11, 2009, 773 downloads.
  26. Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hector Gonzalez, "TraClass: Trajectory Classification Using Hierarchical Region-Based and Trajectory-Based Clustering", InProceedings, Int. Conf. on Very Large Data Base (VLDB'08), August 02, 2008, 765 downloads.
  27. Daryl Walleck, Yingjiu Li, Shouhuai Xu, "An Empirical Analysis of Certificate Revocation Lists", InProceedings, Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, September 02, 2008, 753 downloads.
  28. Mohammad Masud, Jing Gao, Latifur Khan, Jiawei Han, Xiaohu Li, "A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data", Article, December 30, 2008, 749 downloads.
  29. Anupam Joshi, Wenjia Li, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", Article, 10th International Conference on Mobile Data Management (MDM 2009), May 18, 2009, 748 downloads.
  30. Ryan Layfield, Murat Kantarcioglu, Xiaohu Li, "Incentive and Trust Issues in Assured Information Sharing", InProceedings, International Conference on Collaborative Computing, November 11, 2009, 716 downloads.
Pages 1, 2, 3, 4, 5, 6