We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
Formation of suitable overlay-network topologies that are able to reflect the structure of the underlying network-infrastructure, has rarely been addressed by peer-to-peer applic...
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...