Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...
This paper addresses the issue of the explanation of the result given to the end-user by a classifier, when it is used as a decision support system. We consider machine learning cl...
The description, composition, and execution of even logically simple scientific workflows are often complicated by the need to deal with "messy" issues like heterogeneou...
Yong Zhao, James E. Dobson, Ian T. Foster, Luc Mor...
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...