Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
There are a large number of websites serving valuable content that can be used by higher-level applications, Web Services, Mashups etc. Yet, due to various reasons (lack of comput...
There are different strategies to integrate software systems: integration on the data layer, on the business logic layer, and on the user interface layer. The latter area, recent...
Google Maps and Google Earth are very popular web mapping services but they are not open and not OGC-compliant. The question arises why this is not the case. One reason is that com...