TRBAC: A temporal role-based access control model E Bertino, PA Bonatti, E Ferrari Proceedings of the fifth ACM workshop on Role-based access control, 21-30, 2000 | 1356 | 2000 |
State-of-the-art in privacy preserving data mining VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis ACM Sigmod Record 33 (1), 50-57, 2004 | 1220 | 2004 |
A generalized temporal role-based access control model JBD Joshi, E Bertino, U Latif, A Ghafoor IEEE transactions on knowledge and data engineering 17 (1), 4-23, 2005 | 829 | 2005 |
The specification and enforcement of authorization constraints in workflow management systems E Bertino, E Ferrari, V Atluri ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999 | 824 | 1999 |
Botnets and internet of things security E Bertino, N Islam Computer 50 (2), 76-79, 2017 | 780 | 2017 |
Association rule hiding VS Verykios, AK Elmagarmid, E Bertino, Y Saygin, E Dasseni IEEE Transactions on knowledge and data engineering 16 (4), 434-447, 2004 | 732 | 2004 |
GEO-RBAC: a spatially aware RBAC ML Damiani, E Bertino, B Catania, P Perlasca ACM Transactions on Information and System Security (TISSEC) 10 (1), 2-es, 2007 | 702 | 2007 |
Database security-concepts, approaches, and challenges E Bertino, R Sandhu IEEE Transactions on Dependable and secure computing 2 (1), 2-19, 2005 | 686 | 2005 |
Purpose based access control of complex data for privacy protection JW Byun, E Bertino, N Li Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 678 | 2005 |
Disclosure limitation of sensitive rules M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX …, 1999 | 639 | 1999 |
Quality control in crowdsourcing systems: Issues and directions M Allahbakhsh, B Benatallah, A Ignjatovic, HR Motahari-Nezhad, ... IEEE Internet Computing 17 (2), 76-81, 2013 | 568 | 2013 |
Efficient k-Anonymization Using Clustering Techniques JW Byun, A Kamra, E Bertino, N Li International conference on database systems for advanced applications, 188-200, 2007 | 522 | 2007 |
A model of authorization for next-generation database systems F Rabitti, E Bertino, W Kim, D Woelk ACM Transactions on Database Systems (TODS) 16 (1), 88-131, 1991 | 512 | 1991 |
Challenges and opportunities with Big Data 2011-1 D Agrawal, P Bernstein, E Bertino, S Davidson, U Dayal, M Franklin, ... | 510* | 2011 |
Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 499 | 2010 |
Secure and selective dissemination of XML documents E Bertino, E Ferrari ACM Transactions on Information and System Security (TISSEC) 5 (3), 290-331, 2002 | 464 | 2002 |
Composite objects revisited W Kim, E Bertino, JF Garza Proceedings of the 1989 ACM SIGMOD international conference on Management of …, 1989 | 442 | 1989 |
Hiding association rules by using confidence and support E Dasseni, VS Verykios, AK Elmagarmid, E Bertino Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001 | 441 | 2001 |
Preserving user location privacy in mobile data management infrastructures R Cheng, Y Zhang, E Bertino, S Prabhakar Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006 | 439 | 2006 |
A unified framework for enforcing multiple access control policies S Jajodia, P Samarati, VS Subrahmanian, E Bertino ACM Sigmod Record 26 (2), 474-485, 1997 | 427 | 1997 |