Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Abstract—The online presence projected by a person is comprised of all the information about them available on the Internet. In online communities and social networking services,...
Ryan Wishart, Domenico Corapi, Anil Madhavapeddy, ...
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu