Show all resources, publications only, all other resources
Order by date title download citation
Pages 1, 2, 3, 4, 5, 6

Page 1: Showing 30 out of 156 resources

  1. Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino, "Mask: a System for Privacy-Preserving Policy Based Access to Published Content", InProceedings, Proceedings of the 2010 ACM SIGMOD Conference, January 16, 2010, 8414 downloads.
  2. Hans-Peter Kriegel, "Truth Finding and Veracity Analysis", Article, December 31, 1969, 3026 downloads.
  3. Qun ni, Elisa Bertino, Jorge Lobo, "Risk-Based Access Control Systems Built of Fuzzy Inferences", InProceedings, Proc. of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS), April 13, 2010, 2358 downloads.
  4. Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Xiaohu Li, "A Semantic Web Based Framework for Social Network Access Control", InProceedings, 14th ACM Symposium on Access Control Technologies, June 03, 2009, 2030 downloads.
  5. Rodolfo Ferrini, Elisa Bertino, "Supporting RBAC with XACML+OWL", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1727 downloads.
  6. Ninghui Li, "Access control policy comparison", Article, September 18, 2009, 1610 downloads.
  7. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 11, 2008, 1543 downloads.
  8. Onkar Walavalkar, Anupam Joshi, Tim Finin, Yelena Yesha, "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 26, 2008, 1478 downloads.
  9. Tim Oates, Tim Finin, Pranam Kolari, Deepak Chinavle, "Ensembles in Adversarial Classification for Spam", Article, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 02, 2009, 1391 downloads.
  10. Mummoorthy Murugesan, Christopher W. Clifton, "Plausibly Deniable Search", InProceedings, Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), November 03, 2008, 1345 downloads.
  11. Wenjia Li, Jim Parker, Anupam Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 14, 2008, 1311 downloads.
  12. Yizhou Sun, Yintao Yu, Jiawei Han, "Ranking-Based Clustering of Heterogeneous Information Networks with Star Network Schema", InProceedings, Proc. 2009 ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'09), August 30, 2009, 1310 downloads.
  13. Prathima Rao, Elisa Bertino, Wahbeh Qardaji, Qihua Wang, Ninghui Li, "Access Control Policy Combining: Theory Meets Practice", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1297 downloads.
  14. Michael S. Kirkpatrick, Elisa Bertino, "Enforcing Spatial Constraints with Geo-RBAC", InProceedings, Proc. of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), June 09, 2010, 1276 downloads.
  15. Xiaoxin Yin, Jiawei Han, Philip S Yu, "Truth Discovery with Multiple Conflicting Information Providers on the Web", InProceedings, IEEE Transactions on Knowledge and Data Engineering, November 30, 2008, 1229 downloads.
  16. Elisa Bertino, Pankaj Rohatgi, Seraphin Calo, Jorge Lobo, Qun ni, "Automating Role-based Provisioning by Learning from Examples", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1217 downloads.
  17. Haimonti Dutta, et al. , "TagLearner: A P2P Classifier Learning System from Collaboratively Tagged Text Documents", InProceedings, Proceedings of the 2009 IEEE International Conference on Data Mining Workshops, December 06, 2009, 1205 downloads.
  18. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 01, 2008, 1165 downloads.
  19. Ravi Sandhu, "The PEI Framework for Application-Centric Security", InProceedings, 1st International Workshop on Security and Communication Networks (IWSCN), May 20, 2009, 929 downloads.
  20. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 01, 2008, 928 downloads.
  21. Xiaohu Li, Paul Parker, Shouhuai Xu, "A Stochastic Model for Quantitative Security Analysis of Networked Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), February 02, 2008, 902 downloads.
  22. Kevin K Nam, Mark S Ackerman, Lada Adamic, "Questions in, Knowledge iN? A Study of Naver’s Question Answering Community", InProceedings, Conference on Human Factors in Computing Systems, CHI 09, April 04, 2009, 901 downloads.
  23. Murat Kantarcioglu, Robert Nix, Jaideep Vaidya, "An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining", InProceedings, 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, April 27, 2009, 881 downloads.
  24. Shouhuai Xu, Qun ni, Elisa Bertino, Ravi Sandhu, "A Characterization of the Problem of Secure Provenance Management", InProceedings, IEEE International Conference on Intelligence and Security Informatics (ISI-2009), June 11, 2009, 853 downloads.
  25. Daryl Walleck, Yingjiu Li, Shouhuai Xu, "An Empirical Analysis of Certificate Revocation Lists", InProceedings, Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, September 02, 2008, 840 downloads.
  26. Anupam Joshi, Wenjia Li, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", Article, 10th International Conference on Mobile Data Management (MDM 2009), May 18, 2009, 833 downloads.
  27. Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hector Gonzalez, "TraClass: Trajectory Classification Using Hierarchical Region-Based and Trajectory-Based Clustering", InProceedings, Int. Conf. on Very Large Data Base (VLDB'08), August 02, 2008, 816 downloads.
  28. Bolin Ding, David Lo, Jiawei Han, Siau-Cheng Khoo, "Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database", Proceedings, Proc. 2009 Int. Conf. on Data Engineering (ICDE'09), Shanghai, China, Mar. 2009, March 01, 2009, 796 downloads.
  29. Mohammad Masud, Jing Gao, Latifur Khan, Jiawei Han, Xiaohu Li, "A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data", Article, December 30, 2008, 787 downloads.
  30. Palanivel Andiappan Kodeswaran, Filip Perich, Wenjia Li, Anupam Joshi, Tim Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 31, 2010, 756 downloads.
Pages 1, 2, 3, 4, 5, 6