Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("BERTINO, Elisa")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 165

  • Page / 7
Export

Selection :

  • and

ECOOP 2000 _ object-oriented programming (Sophia Antipolis ; Cannes, 12-16 June 2000)Bertino, Elisa.Lecture notes in computer science. 2000, issn 0302-9743, isbn 3-540-67660-0, XIII, 491 p, isbn 3-540-67660-0Conference Proceedings

Privacy-preserving authentication of trees and graphsKUNDU, Ashish; BERTINO, Elisa.International journal of information security (Print). 2013, Vol 12, Num 6, pp 467-494, issn 1615-5262, 28 p.Article

Developing security systems in the real worldLI GONG.Lecture notes in computer science. 2000, issn 0302-9743, isbn 3-540-67660-0, p. 251Conference Paper

Load-time structural reflection in JavaCHIBA, S.Lecture notes in computer science. 2000, pp 313-336, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Privacy-preserving database systemsBERTINO, Elisa; BYUN, Ji-Won; NINGHUI LI et al.Lecture notes in computer science. 2005, pp 178-206, issn 0302-9743, isbn 3-540-29243-8, 1Vol, 29 p.Conference Paper

Efficient systematic clustering method for k-anonymizationKABIR, Md. Enamul; HUA WANG; BERTINO, Elisa et al.Acta informatica. 2011, Vol 48, Num 1, pp 51-66, issn 0001-5903, 16 p.Article

Context-Aware Adaptation of Access-Control Policies : CRISIS MANAGEMENTSAMUEL, Arjmand; GHAFOOR, Arif; BERTINO, Elisa et al.IEEE internet computing. 2008, Vol 12, Num 1, pp 51-54, issn 1089-7801, 4 p.Article

MaX: An access control system for digital libraries and the WebBERTINO, Elisa; FERRARI, Elena; PEREGO, Andrea et al.Proceedings - International Computer Software & Applications Conference. 2002, pp 945-950, isbn 0-7695-1727-7, 6 p.Conference Paper

Watermarking Relational Databases Using Optimization-Based TechniquesSHEHAB, Mohamed; BERTINO, Elisa; GHAFOOR, Arif et al.IEEE transactions on knowledge and data engineering. 2008, Vol 20, Num 1, pp 116-129, issn 1041-4347, 14 p.Article

An integrated approach to federated identity and privilege management in open systemsBHATTI, Rafae; BERTINO, Elisa; GHAFOOR, Arif et al.Communications of the ACM. 2007, Vol 50, Num 2, pp 81-87, issn 0001-0782, 7 p.Article

Jam : A smooth extension of Java with mixinsANCONA, D; LAGORIO, G; ZUCCA, E et al.Lecture notes in computer science. 2000, pp 154-178, issn 0302-9743, isbn 3-540-67660-0Conference Paper

A basic model of typed componentsSECO, J. C; CAIRES, L.Lecture notes in computer science. 2000, pp 108-128, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Design templates for collective behaviorKELLOMÄKI, P; MIKKONEN, T.Lecture notes in computer science. 2000, pp 277-295, issn 0302-9743, isbn 3-540-67660-0Conference Paper

UML-F : A modeling language for object-oriented frameworksFONTOURA, M; PREE, W; RUMPE, B et al.Lecture notes in computer science. 2000, pp 63-82, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Copying and comparing : Problems and solutionsGROGONO, P; SAKKINEN, M.Lecture notes in computer science. 2000, pp 226-250, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Advances in spatial and temporal databases (Angra dos Reis, 22-24 August 2005)Bauzer Medeiros, Claudia; Egenhofer, Max; Bertino, Elisa et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28127-4, XIII, 432 p, isbn 3-540-28127-4Conference Proceedings

On Inner ClassesIGARASHI, A; PIERCE, B. C.Lecture notes in computer science. 2000, pp 129-153, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Ionic typesDOBSON, S; MATTHEWS, B.Lecture notes in computer science. 2000, pp 296-312, issn 0302-9743, isbn 3-540-67660-0Conference Paper

Multifactor Identity Verification Using Aggregated Proof of Knowledge : Availability, reliability, and securityBHARGAV-SPANTZEL, Abhilasha; SQUICCIARINI, Anna Cinzia; RUI XUE et al.IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews. 2010, Vol 40, Num 4, pp 372-383, issn 1094-6977, 12 p.Article

Policy Mapper : Administering Location-Based Access-Control PoliciesBHATTI, Rafae; DAMIANI, Maria Luisa; BETTIS, David W et al.IEEE internet computing. 2008, Vol 12, Num 2, pp 38-45, issn 1089-7801, 8 p.Article

A Generalized Temporal role-based access control modelJOSHI, James B. D; BERTINO, Elisa; LATIF, Usman et al.IEEE transactions on knowledge and data engineering. 2005, Vol 17, Num 1, pp 4-23, issn 1041-4347, 20 p.Article

Securing DBMS: Characterizing and detecting query floodsBERTINO, Elisa; LEGGIERI, Teodoro; TERZI, Evimaria et al.Lecture notes in computer science. 2004, pp 195-206, issn 0302-9743, isbn 3-540-23208-7, 12 p.Conference Paper

Hybrid Role hierarchy for Generalized Temporal Role Based Access Control modelJOSHI, James B. D; BERTINO, Elisa; GHAFOOR, Arif et al.Proceedings - International Computer Software & Applications Conference. 2002, pp 951-956, isbn 0-7695-1727-7, 6 p.Conference Paper

Secure interoperation in a multidomain environment employing RBAC policiesSHAFIQ, Basit; JOSHI, James B. D; BERTINO, Elisa et al.IEEE transactions on knowledge and data engineering. 2005, Vol 17, Num 11, pp 1557-1577, issn 1041-4347, 21 p.Article

Information driven evaluation of data hiding algorithmsBERTINO, Elisa; FOVINO, Igor Nai.Lecture notes in computer science. 2005, pp 418-427, issn 0302-9743, isbn 3-540-28558-X, 10 p.Conference Paper

  • Page / 7