2019 - ACM Athena Lecturer Award For pioneering and impactful contributions to data management, security, and privacy, along with outstanding contributions to broadening participation in computing via professional leadership and mentoring
2016 - Fellow of the American Association for the Advancement of Science (AAAS)
2003 - ACM Fellow For contributions to secure database systems.
2002 - IEEE Fellow For contributions to the theory of object-oriented databases, temporal databases, and database security.
Elisa Bertino mostly deals with Access control, Computer security, Authorization, Data mining and Role-based access control. Her Access control study combines topics in areas such as Data security and World Wide Web, The Internet. Her Computer security study typically links adjacent topics like Internet privacy.
Her Authorization study incorporates themes from Security policy, Key management, Database and Public-key cryptography. The concepts of her Data mining study are interwoven with issues in Set, Search engine indexing and Cluster analysis. Many of her research projects under Role-based access control are closely connected to Permission with Permission, tying the diverse disciplines of science together.
Her primary scientific interests are in Computer security, Access control, Database, World Wide Web and Data mining. Her research is interdisciplinary, bridging the disciplines of Internet privacy and Computer security. She interconnects Context, Distributed computing and Authorization in the investigation of issues within Access control.
XML, Web service and The Internet are among the areas of World Wide Web where the researcher is concentrating her efforts. All of her Information privacy and Privacy software and Privacy by Design investigations are sub-components of the entire Information privacy study.
Elisa Bertino mainly investigates Computer security, Access control, Computer network, Artificial intelligence and Context. Computer security is often connected to Internet privacy in her work. Elisa Bertino combines subjects such as Anomaly detection and Database with her study of Access control.
Anomaly detection is a subfield of Data mining that Elisa Bertino explores. Her Encryption study integrates concerns from other disciplines, such as Service provider and Server. Her Privacy software study combines topics from a wide range of disciplines, such as Cloud computing security and Personally identifiable information.
Her primary areas of investigation include Computer security, Computer network, Access control, Information privacy and Authentication. Her work carried out in the field of Computer security brings together such families of science as Resource and Cloud computing security. Her Computer network research incorporates themes from Key distribution in wireless sensor networks and Wireless ad hoc network.
In her research on the topic of Access control, Relational database is strongly related with Anomaly detection. While the research belongs to areas of Information privacy, Elisa Bertino spends her time largely on the problem of Big data, intersecting her research to questions surrounding Application security and Privacy by Design. Her research integrates issues of Password and Vehicular ad hoc network in her study of Authentication.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
TRBAC: A temporal role-based access control model
Elisa Bertino;Piero Andrea Bonatti;Elena Ferrari.
ACM Transactions on Information and System Security (2001)
State-of-the-art in privacy preserving data mining
Vassilios S. Verykios;Elisa Bertino;Igor Nai Fovino;Loredana Parasiliti Provenza.
international conference on management of data (2004)
The specification and enforcement of authorization constraints in workflow management systems
Elisa Bertino;Elena Ferrari;Vijay Atluri.
ACM Transactions on Information and System Security (1999)
A generalized temporal role-based access control model
J.B.D. Joshi;E. Bertino;U. Latif;A. Ghafoor.
IEEE Transactions on Knowledge and Data Engineering (2005)
Association rule hiding
V.S. Verykios;A.K. Elmagarmid;E. Bertino;Y. Saygin.
IEEE Transactions on Knowledge and Data Engineering (2004)
Database security - concepts, approaches, and challenges
E. Bertino;R. Sandhu.
IEEE Transactions on Dependable and Secure Computing (2005)
Disclosure limitation of sensitive rules
M. Atallah;E. Bertino;A. Elmagarmid;M. Ibrahim.
Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453) (1999)
A model of authorization for next-generation database systems
Fausto Rabitti;Elisa Bertino;Won Kim;Darrell Woelk.
ACM Transactions on Database Systems (1991)
Secure and selective dissemination of XML documents
Elisa Bertino;Elena Ferrari.
ACM Transactions on Information and System Security (2002)
Privacy-aware role-based access control
Qun Ni;Elisa Bertino;Jorge Lobo;Carolyn Brodie.
ACM Transactions on Information and System Security (2010)
(Impact Factor: 2.773)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: