Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

CERIAS

Known as: COAST Laboratory, Center for Education and Research in Information Assurance and Security, Coast (disambiguation) 
The Center for Education and Research in Information Assurance and Security (CERIAS) of Purdue University, United States, is a center for research… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Policy integration and inter-operation is often a crucial requirement when parties with different access control policies need to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2009
2009
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Highly Cited
2009
Highly Cited
2009
Increasingly, new regulations are governing organizations and their information systems. Individuals responsible for ensuring… Expand
  • figure 1
Highly Cited
2007
Highly Cited
2007
In many business scenarios, record matching is performed across different data sources with the aim of identifying common… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2007
2007
Push-based systems for distributing information through Internet are today becoming more and more popular and widely used. The… Expand
  • figure 1
  • figure 3
  • table 1
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
Data anonymization techniques based on the k-anonymity model have been the focus of intense research in the last few years… Expand
  • figure 2
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Highly Cited
2004
Highly Cited
2004
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such… Expand
  • figure 1.1
  • figure 3.1
  • figure 4.1
  • figure 4.4
  • figure 4.5
Highly Cited
2001
Highly Cited
2001
Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events… Expand
  • figure 4
Highly Cited
2001
Highly Cited
2001
 
  • figure 4
Highly Cited
2001
Highly Cited
2001
Suppose that Bob has a databaseDand that Alice wants to perform a search queryqonD(e.g., “isqinD?”).Since Alice is concerned… Expand
  • figure 1