: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...