Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("BERTINO, Elisa")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 232

  • Page / 10
Export

Selection :

  • and

ECOOP 2000 _ object-oriented programming (Sophia Antipolis ; Cannes, 12-16 June 2000)Bertino, Elisa.Lecture notes in computer science. 2000, issn 0302-9743, isbn 3-540-67660-0, XIII, 491 p, isbn 3-540-67660-0Conference Proceedings

A New Model for Secure Dissemination of XML Content : Enterprise Services Computing and Industrial ApplicationsKUNDU, Ashish; BERTINO, Elisa.IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews. 2008, Vol 38, Num 3, pp 292-301, issn 1094-6977, 10 p.Conference Paper

Privacy-preserving authentication of trees and graphsKUNDU, Ashish; BERTINO, Elisa.International journal of information security (Print). 2013, Vol 12, Num 6, pp 467-494, issn 1615-5262, 28 p.Article

Replacing lost or stolen E-passportsJIANMING YONG; BERTINO, Elisa.Computer (Long Beach, CA). 2007, Vol 40, Num 10, pp 89-91, issn 0018-9162, 3 p.Article

A mixin-based, semantics-based approach to reusing domain-specific programming languagesDUGGAN, D.Lecture notes in computer science. 2000, pp 179-200, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Towards a unified programming languageMADSEN, O. L.Lecture notes in computer science. 2000, pp 1-26, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Using objects for next generation communication servicesCOCHINWALA, M.Lecture notes in computer science. 2000, pp 388-393, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Developing security systems in the real worldLI GONG.Lecture notes in computer science. 2000, issn 0302-9743, isbn 3-540-67660-0, p. 251Conference Paper

HERCULE : Non-invasively tracking Java<TM> component-based application activityRENAUD, K.Lecture notes in computer science. 2000, pp 447-471, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Load-time structural reflection in JavaCHIBA, S.Lecture notes in computer science. 2000, pp 313-336, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Privacy-preserving database systemsBERTINO, Elisa; BYUN, Ji-Won; NINGHUI LI et al.Lecture notes in computer science. 2005, pp 178-206, issn 0302-9743, isbn 3-540-29243-8, 1Vol, 29 p.Conference Paper

Efficient systematic clustering method for k-anonymizationKABIR, Md. Enamul; HUA WANG; BERTINO, Elisa et al.Acta informatica. 2011, Vol 48, Num 1, pp 51-66, issn 0001-5903, 16 p.Article

Context-Aware Adaptation of Access-Control Policies : CRISIS MANAGEMENTSAMUEL, Arjmand; GHAFOOR, Arif; BERTINO, Elisa et al.IEEE internet computing. 2008, Vol 12, Num 1, pp 51-54, issn 1089-7801, 4 p.Article

MaX: An access control system for digital libraries and the WebBERTINO, Elisa; FERRARI, Elena; PEREGO, Andrea et al.Proceedings - International Computer Software & Applications Conference. 2002, pp 945-950, isbn 0-7695-1727-7, 6 p.Conference Paper

A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model : PRIVACY AND TRUST MANAGEMENT IN CLOUD AND DISTRIBUTED SYSTEMSHASAN, Omar; BRUNIE, Lionel; BERTINO, Elisa et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 949-962, issn 1556-6013, 14 p.Article

Achieving anonymity in mobile ad hoc networks using fuzzy position informationXIAOXIN WU; JUN LIU; XIAOYAN HONG et al.Lecture notes in computer science. 2006, pp 461-472, issn 0302-9743, isbn 3-540-49932-6, 1Vol, 12 p.Conference Paper

Watermarking Relational Databases Using Optimization-Based TechniquesSHEHAB, Mohamed; BERTINO, Elisa; GHAFOOR, Arif et al.IEEE transactions on knowledge and data engineering. 2008, Vol 20, Num 1, pp 116-129, issn 1041-4347, 14 p.Article

An integrated approach to federated identity and privilege management in open systemsBHATTI, Rafae; BERTINO, Elisa; GHAFOOR, Arif et al.Communications of the ACM. 2007, Vol 50, Num 2, pp 81-87, issn 0001-0782, 7 p.Article

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection : Spatial and temporal databasesGHINITA, Gabriel; WALRUS, Panos; KANTARCIOGLU, Murat et al.Geoinformatica (Dordrecht). 2011, Vol 15, Num 4, pp 699-726, issn 1384-6175, 28 p.Article

Detecting anomalous access patterns in relational databasesKAMRA, Ashish; TERZI, Evimaria; BERTINO, Elisa et al.The VLDB journal. 2008, Vol 17, Num 5, pp 1063-1077, issn 1066-8888, 15 p.Article

Jam : A smooth extension of Java with mixinsANCONA, D; LAGORIO, G; ZUCCA, E et al.Lecture notes in computer science. 2000, pp 154-178, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Automated test case generation from dynamic modelsFRÖHLICH, P; LINK, J.Lecture notes in computer science. 2000, pp 472-491, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Extending moby with inheritance-based subtypingFISHER, K; REPPY, J.Lecture notes in computer science. 2000, pp 83-107, issn 0302-9743, isbn 3-540-67660-0Conference Paper

A basic model of typed componentsSECO, J. C; CAIRES, L.Lecture notes in computer science. 2000, pp 108-128, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Design templates for collective behaviorKELLOMÄKI, P; MIKKONEN, T.Lecture notes in computer science. 2000, pp 277-295, issn 0302-9743, isbn 3-540-67660-0Conference Paper

  • Page / 10