Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
IT value remains a serious concern of management today, especially how it should be measured and how it is created. Although we have made significant progress at the firm and aggre...
Prabu Davamanirajan, Robert J. Kauffman, Charles H...
The fast development of technologies requires specialized skills that need to be renewed frequently. For example, the semantic web technologies related to knowledge centric organi...
Although electronic media has changed how people interact with documents, today’s electronic documents and the environments in which they are used are still impoverished relativ...