Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...