Skip to main content

Showing 1–36 of 36 results for author: Bertino, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17190  [pdf, other

    cs.CR

    SoK: Leveraging Transformers for Malware Analysis

    Authors: Pradip Kunwar, Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Elisa Bertino

    Abstract: The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising application domain for transformers is cybersecurity, in particular the malware domain analysis. The reason is the flexibility of the transformer models in handling long sequential features and understanding contextual relationship… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2403.00935  [pdf, other

    cs.CR cs.LG

    Transfer Learning for Security: Challenges and Future Directions

    Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino

    Abstract: Many machine learning and data mining algorithms rely on the assumption that the training and testing data share the same feature space and distribution. However, this assumption may not always hold. For instance, there are situations where we need to classify data in one domain, but we only have sufficient training data available from a different domain. The latter data may follow a distinct dist… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  3. arXiv:2401.04958  [pdf, other

    cs.CR

    FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning

    Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino

    Abstract: Fake base stations (FBSes) pose a significant security threat by impersonating legitimate base stations. Though efforts have been made to defeat this threat, up to this day, the presence of FBSes and the multi-step attacks (MSAs) stemming from them can lead to unauthorized surveillance, interception of sensitive information, and disruption of network services for legitimate users. Therefore, detec… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  4. arXiv:2312.13119  [pdf, other

    cs.CR cs.CL cs.LG

    Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs

    Authors: Xin **, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu

    Abstract: The rampant occurrence of cybersecurity breaches imposes substantial limitations on the progress of network infrastructures, leading to compromised data, financial losses, potential harm to individuals, and disruptions in essential services. The current security landscape demands the urgent development of a holistic security assessment solution that encompasses vulnerability analysis and investiga… ▽ More

    Submitted 30 April, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

  5. arXiv:2312.09665  [pdf, other

    cs.CR cs.AI

    FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge

    Authors: Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino

    Abstract: Speech recognition systems driven by DNNs have revolutionized human-computer interaction through voice interfaces, which significantly facilitate our daily lives. However, the growing popularity of these systems also raises special concerns on their security, particularly regarding backdoor attacks. A backdoor attack inserts one or more hidden backdoors into a DNN model during its training process… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: To appear at lEEE Symposium on Security & Privacy (Oakland) 2024

  6. arXiv:2312.07877  [pdf, other

    cs.CR

    Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode

    Authors: Zilin Shen, Imtiaz Karim, Elisa Bertino

    Abstract: The IEEE 802.11 family of standards, better known as WiFi, is a widely used protocol utilized by billions of users. Previous works on WiFi formal verification have mostly focused on the four-way handshake and other security aspects. However, recent works have uncovered severe vulnerabilities in functional aspects of WiFi, which can cause information leakage for billions of devices. No formal analy… ▽ More

    Submitted 16 December, 2023; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted to AsiaCCS 2024

  7. arXiv:2311.04326  [pdf

    cs.CY cs.AI cs.CR

    Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements

    Authors: Sorin Adam Matei, Elisa Bertino

    Abstract: The present study explored managerial and instructor perceptions of their freshly employed cybersecurity workers' or students' preparedness to work effectively in a changing cybersecurity environment that includes AI tools. Specifically, we related perceptions of technical preparedness to ethical, systems thinking, and communication skills. We found that managers and professors perceive preparedne… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  8. arXiv:2311.00903  [pdf

    cs.CR cs.AI cs.CY

    Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report

    Authors: Diane Jackson, Sorin Adam Matei, Elisa Bertino

    Abstract: The emergence of AI tools in cybersecurity creates many opportunities and uncertainties. A focus group with advanced graduate students in cybersecurity revealed the potential depth and breadth of the challenges and opportunities. The salient issues are access to open source or free tools, documentation, curricular diversity, and clear articulation of ethical principles for AI cybersecurity educati… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  9. TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support

    Authors: Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz

    Abstract: Trust evaluation assesses trust relationships between entities and facilitates decision-making. Machine Learning (ML) shows great potential for trust evaluation owing to its learning capabilities. In recent years, Graph Neural Networks (GNNs), as a new ML paradigm, have demonstrated superiority in dealing with graph data. This has motivated researchers to explore their use in trust evaluation, as… ▽ More

    Submitted 4 February, 2024; v1 submitted 23 June, 2023; originally announced June 2023.

    Comments: Accepted by IEEE TDSC. Code: https://github.com/Jieerbobo/TrustGuard

  10. arXiv:2306.00262  [pdf, other

    cs.CV

    Maximal Domain Independent Representations Improve Transfer Learning

    Authors: Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N Wegman

    Abstract: The most effective domain adaptation (DA) involves the decomposition of data representation into a domain independent representation (DIRep), and a domain dependent representation (DDRep). A classifier is trained by using the DIRep of the labeled source images. Since the DIRep is domain invariant, the classifier can be "transferred" to make predictions for the target domain with no (or few) labels… ▽ More

    Submitted 6 June, 2024; v1 submitted 31 May, 2023; originally announced June 2023.

  11. arXiv:2306.00202  [pdf, other

    cs.CV cs.LG

    Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation

    Authors: Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu

    Abstract: Deep learning (DL) techniques are highly effective for defect detection from images. Training DL classification models, however, requires vast amounts of labeled data which is often expensive to collect. In many cases, not only the available training data is limited but may also imbalanced. In this paper, we propose a novel domain adaptation (DA) approach to address the problem of labeled training… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  12. arXiv:2304.10977  [pdf, other

    cs.CL stat.ML

    Evaluating Transformer Language Models on Arithmetic Operations Using Number Decomposition

    Authors: Matteo Muffo, Aldo Cocco, Enrico Bertino

    Abstract: In recent years, Large Language Models such as GPT-3 showed remarkable capabilities in performing NLP tasks in the zero and few shot settings. On the other hand, the experiments highlighted the difficulty of GPT-3 in carrying out tasks that require a certain degree of reasoning, such as arithmetic operations. In this paper we evaluate the ability of Transformer Language Models to perform arithmeti… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

    Comments: 7 pages, 1 figure, published at LREC 2022

    Journal ref: Proceedings of the 13th Conference on Language Resources and Evaluation (LREC 2022), pages 291-297

  13. arXiv:2303.18121  [pdf, ps, other

    cs.CL stat.ML

    BERTino: an Italian DistilBERT model

    Authors: Matteo Muffo, Enrico Bertino

    Abstract: The recent introduction of Transformers language representation models allowed great improvements in many natural language processing (NLP) tasks. However, if on one hand the performances achieved by this kind of architectures are surprising, on the other their usability is limited by the high number of parameters which constitute their network, resulting in high computational and memory demands.… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: 5 pages

    Journal ref: Proceedings of the Seventh Italian Conference on Computational Linguistics CLiC-it 2020

  14. arXiv:2301.09201  [pdf, other

    cs.IR cs.CR cs.LG

    SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis

    Authors: Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino

    Abstract: 5G is the 5th generation cellular network protocol. It is the state-of-the-art global wireless standard that enables an advanced kind of network designed to connect virtually everyone and everything with increased speed and reduced latency. Therefore, its development, analysis, and security are critical. However, all approaches to the 5G protocol development and security analysis, e.g., property e… ▽ More

    Submitted 14 September, 2023; v1 submitted 22 January, 2023; originally announced January 2023.

  15. arXiv:2210.03014  [pdf, other

    cs.CR

    EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry

    Authors: Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino

    Abstract: Modern smart TVs often communicate with their remote controls (including those smart phone simulated ones) using multiple wireless channels (e.g., Infrared, Bluetooth, and Wi-Fi). However, this multi-channel remote control communication introduces a new attack surface. An inherent security flaw is that remote controls of most smart TVs are designed to work in a benign environment rather than an ad… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  16. arXiv:2201.09370  [pdf, other

    cs.CR cs.LG

    Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models

    Authors: Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino

    Abstract: Increasing use of machine learning (ML) technologies in privacy-sensitive domains such as medical diagnoses, lifestyle predictions, and business decisions highlights the need to better understand if these ML technologies are introducing leakage of sensitive and proprietary training data. In this paper, we focus on model inversion attacks where the adversary knows non-sensitive attributes about rec… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

    Comments: Conditionally accepted to USENIX Security 2022. This is not the camera-ready version. arXiv admin note: substantial text overlap with arXiv:2012.03404

  17. arXiv:2112.03511  [pdf, other

    cs.RO cs.CR eess.SY

    Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search

    Authors: Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino

    Abstract: In order to support a variety of missions and deal with different flight environments, drone control programs typically provide configurable control parameters. However, such a flexibility introduces vulnerabilities. One such vulnerability, referred to as range specification bugs, has been recently identified. The vulnerability originates from the fact that even though each individual parameter re… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: Accepted to ICSE2022 Technical Track

  18. arXiv:2103.07704  [pdf, other

    cs.LG cs.CR cs.DC

    Simeon -- Secure Federated Machine Learning Through Iterative Filtering

    Authors: Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino

    Abstract: Federated learning enables a global machine learning model to be trained collaboratively by distributed, mutually non-trusting learning agents who desire to maintain the privacy of their training data and their hardware. A global model is distributed to clients, who perform training, and submit their newly-trained model to be aggregated into a superior model. However, federated learning systems ar… ▽ More

    Submitted 13 March, 2021; originally announced March 2021.

  19. arXiv:2103.05758  [pdf, other

    cs.CR cs.SE

    Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps

    Authors: Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun

    Abstract: A fundamental premise of SMS One-Time Password (OTP) is that the used pseudo-random numbers (PRNs) are uniquely unpredictable for each login session. Hence, the process of generating PRNs is the most critical step in the OTP authentication. An improper implementation of the pseudo-random number generator (PRNG) will result in predictable or even static OTP values, making them vulnerable to potenti… ▽ More

    Submitted 6 March, 2021; originally announced March 2021.

  20. arXiv:2101.01279  [pdf

    cs.CY cs.NI

    Computing Research Challenges in Next Generation Wireless Networking

    Authors: Elisa Bertino, Daniel Bliss, Daniel Lopresti, Larry Peterson, Henning Schulzrinne

    Abstract: By all measures, wireless networking has seen explosive growth over the past decade. Fourth Generation Long Term Evolution (4G LTE) cellular technology has increased the bandwidth available for smartphones, in essence, delivering broadband speeds to mobile devices. The most recent 5G technology is further enhancing the transmission speeds and cell capacity, as well as, reducing latency through the… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: A Computing Community Consortium (CCC) white paper, 5 pages

    Report number: ccc2020whitepaper_16

  21. arXiv:2012.09520  [pdf

    cs.CY

    PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols

    Authors: Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang

    Abstract: Many proximity-based tracing (PCT) protocols have been proposed and deployed to combat the spreading of COVID-19. In this paper, we take a systematic approach to analyze PCT protocols. We identify a list of desired properties of a contact tracing design from the four aspects of Privacy, Utility, Resiliency, and Efficiency (PURE). We also identify two main design choices for PCT protocols: what inf… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 35 pages, 10 figures, 7 tables

    ACM Class: C.3; H.4; J.3; J.7; K.4; K.6.5

  22. arXiv:2012.06034  [pdf

    cs.CY cs.AI

    Artificial Intelligence & Cooperation

    Authors: Elisa Bertino, Finale Doshi-Velez, Maria Gini, Daniel Lopresti, David Parkes

    Abstract: The rise of Artificial Intelligence (AI) will bring with it an ever-increasing willingness to cede decision-making to machines. But rather than just giving machines the power to make decisions that affect us, we need ways to work cooperatively with AI systems. There is a vital need for research in "AI and Cooperation" that seeks to understand the ways in which systems of AIs and systems of AIs wit… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: A Computing Community Consortium (CCC) white paper, 4 pages

    Report number: ccc2020whitepaper_4

  23. arXiv:2012.05410  [pdf

    cs.CY cs.AI

    Artificial Intelligence at the Edge

    Authors: Elisa Bertino, Sujata Banerjee

    Abstract: The Internet of Things (IoT) and edge computing applications aim to support a variety of societal needs, including the global pandemic situation that the entire world is currently experiencing and responses to natural disasters. The need for real-time interactive applications such as immersive video conferencing, augmented/virtual reality, and autonomous vehicles, in education, healthcare, disas… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: A Computing Community Consortium (CCC) white paper, 4 pages

    Report number: ccc2020whitepaper_3

  24. arXiv:2012.03404  [pdf, other

    cs.CR cs.LG

    Black-box Model Inversion Attribute Inference Attacks on Classification Models

    Authors: Shagufta Mehnaz, Ninghui Li, Elisa Bertino

    Abstract: Increasing use of ML technologies in privacy-sensitive domains such as medical diagnoses, lifestyle predictions, and business decisions highlights the need to better understand if these ML technologies are introducing leakages of sensitive and proprietary training data. In this paper, we focus on one kind of model inversion attacks, where the adversary knows non-sensitive attributes about instance… ▽ More

    Submitted 6 December, 2020; originally announced December 2020.

  25. arXiv:2010.09767  [pdf, other

    cs.CR

    FLAP -- A Federated Learning Framework for Attribute-based Access Control Policies

    Authors: Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh Verma, Seraphin Calo, Alessandra Russo

    Abstract: Technology advances in areas such as sensors, IoT, and robotics, enable new collaborative applications (e.g., autonomous devices). A primary requirement for such collaborations is to have a secure system which enables information sharing and information flow protection. Policy-based management system is a key mechanism for secure selective sharing of protected resources. However, policies in each… ▽ More

    Submitted 2 November, 2020; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: Presented at AAAI FSS-20: Artificial Intelligence in Government and Public Sector, Washington, DC, USA

  26. arXiv:2003.13604  [pdf

    cs.CY cs.CR cs.NI

    5G Security and Privacy: A Research Roadmap

    Authors: Elisa Bertino, Syed Rafiul Hussain, Omar Chowdhury

    Abstract: Cellular networks represent a critical infrastructure and their security is thus crucial. 5G - the latest generation of cellular networks - combines different technologies to increase capacity, reduce latency, and save energy. Due to its complexity and scale, however, ensuring its security is extremely challenging. In this white paper, we outline recent approaches supporting systematic analyses of… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: A Computing Community Consortium (CCC) white paper, 8 pages

    Report number: ccc2020whitepaper_1

  27. arXiv:1910.06799  [pdf, other

    cs.LG cs.DC

    Federated Learning for Coalition Operations

    Authors: D. Verma, S. Calo, S. Witherspoon, E. Bertino, A. Abu Jabal, A. Swami, G. Cirincione, S. Julier, G. White, G. de Mel, G. Pearson

    Abstract: Machine Learning in coalition settings requires combining insights available from data assets and knowledge repositories distributed across multiple coalition partners. In tactical environments, this requires sharing the assets, knowledge and models in a bandwidth-constrained environment, while staying in conformance with the privacy, security and other applicable policies for each coalition membe… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

    Comments: Presented at AAAI FSS-19: Artificial Intelligence in Government and Public Sector, Arlington, Virginia, USA

  28. arXiv:1807.02593  [pdf, other

    cs.CR cs.NI

    Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations

    Authors: Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kaafar, Elisa Bertino, Sanjay Jha

    Abstract: `Anytime, Anywhere' data access model has become a widespread IT policy in organizations making insider attacks even more complicated to model, predict and deter. Here, we propose Gargoyle, a network-based insider attack resilient framework against the most complex insider threats within a pervasive computing context. Compared to existing solutions, Gargoyle evaluates the trustworthiness of an acc… ▽ More

    Submitted 6 July, 2018; originally announced July 2018.

    Comments: Accepted to IEEE LCN 2018 as full paper, Pre-final version - slightly different than the final version published by the conference

  29. arXiv:1504.05998  [pdf, ps, other

    cs.CR

    Differentially Private $k$-Means Clustering

    Authors: Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia **

    Abstract: There are two broad approaches for differentially private data analysis. The interactive approach aims at develo** customized differentially private algorithms for various data mining tasks. The non-interactive approach aims at develo** differentially private algorithms that can output a synopsis of the input dataset, which can then be used to support various data mining tasks. In this paper w… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

  30. arXiv:1412.4378  [pdf, ps, other

    cs.CR cs.DB

    Privacy-Preserving and Outsourced Multi-User k-Means Clustering

    Authors: Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu

    Abstract: Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, ou… ▽ More

    Submitted 14 December, 2014; originally announced December 2014.

    Comments: 16 pages, 2 figures, 5 tables

    ACM Class: D.4.6; E.3; H.3.3

  31. arXiv:1401.3768  [pdf, ps, other

    cs.CR

    Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases

    Authors: Bharath K. Samanthula, Wei Jiang, Elisa Bertino

    Abstract: With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that can be performed on the cloud side. Especially, evaluating queries over the encrypted data stored on the cloud withou… ▽ More

    Submitted 15 January, 2014; originally announced January 2014.

    Comments: 25 pages, 1 figure

    ACM Class: D.4.6; E.3; H.3.3

  32. arXiv:1211.3200  [pdf, ps, other

    cs.IR cs.SI

    An Analytic Approach to People Evaluation in Crowdsourcing Systems

    Authors: Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, Elisa Bertino

    Abstract: Worker selection is a significant and challenging issue in crowdsourcing systems. Such selection is usually based on an assessment of the reputation of the individual workers participating in such systems. However, assessing the credibility and adequacy of such calculated reputation is a real challenge. In this paper, we propose an analytic model which leverages the values of the tasks completed,… ▽ More

    Submitted 13 November, 2012; originally announced November 2012.

    Comments: 23 pages

    Report number: UNSW-CSE-TR-201204

  33. arXiv:1211.0963  [pdf, ps, other

    cs.CR cs.HC cs.IR

    Detecting, Representing and Querying Collusion in Online Rating Systems

    Authors: Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, Elisa Bertino

    Abstract: Online rating systems are subject to malicious behaviors mainly by posting unfair rating scores. Users may try to individually or collaboratively promote or demote a product. Collaborating unfair rating 'collusion' is more damaging than individual unfair rating. Although collusion detection in general has been widely studied, identifying collusion groups in online rating systems is less studied an… ▽ More

    Submitted 2 November, 2012; originally announced November 2012.

    Comments: 22 pages, 6 figures

    Report number: UNSW-CSE-TR-201220

  34. arXiv:1206.3880  [pdf

    cs.CR eess.SY

    Cryptographic Key Management for Smart Power Grids - Approaches and Issues

    Authors: M. Nabeel, J. Zage, S. Kerr, E. Bertino, N. Athula. Kulatunga, U. Sudheera Navaratne, M. Duren

    Abstract: The smart power grid promises to improve efficiency and reliability of power delivery. This report introduces the logical components, associated technologies, security protocols, and network designs of the system. Undermining the potential benefits are security threats, and those threats related to cyber security are described in this report. Concentrating on the design of the smart meter and its… ▽ More

    Submitted 18 June, 2012; originally announced June 2012.

    Report number: CERIAS TR 2012-02 CERIAS TR 2012-02 CERIAS TR 2012-02

  35. arXiv:cs/0404003  [pdf, ps, other

    cs.DB

    Enhancing the expressive power of the U-Datalog language

    Authors: Elisa Bertino, Barbara Catania, Roberta Gori

    Abstract: U-Datalog has been developed with the aim of providing a set-oriented logical update language, guaranteeing update parallelism in the context of a Datalog-like language. In U-Datalog, updates are expressed by introducing constraints (+p(X), to denote insertion, and [minus sign]p(X), to denote deletion) inside Datalog rules. A U-Datalog program can be interpreted as a CLP program. In this framewo… ▽ More

    Submitted 1 April, 2004; originally announced April 2004.

    Comments: Appeared in Theory and Practice of Logic Programming, vol. 1, no. 1, 2001

    ACM Class: D.1.6; D.3.2

    Journal ref: Theory and Practice of Logic Programming, vol. 1, no. 1, 2001

  36. arXiv:cs/0207076  [pdf, ps, other

    cs.PL cs.DB cs.LO

    Introducing Dynamic Behavior in Amalgamated Knowledge Bases

    Authors: Elisa Bertino, Barbara Catania, Paolo Perlasca

    Abstract: The problem of integrating knowledge from multiple and heterogeneous sources is a fundamental issue in current information systems. In order to cope with this problem, the concept of mediator has been introduced as a software component providing intermediate services, linking data resources and application programs, and making transparent the heterogeneity of the underlying systems. In designing… ▽ More

    Submitted 22 July, 2002; originally announced July 2002.

    Comments: Other Keywords: Deductive databases; Heterogeneous databases; Active rules; Updates

    ACM Class: D.1.6 Logic Programming; H.2.5 Heterogeneous Databases; F.4.1 Mathematical Logic, Logic and constraint programming