Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
In this study, an adaptive Bayesian decision model is developed to determine the optimal replacement age for the systems maintained according to a general age replacement policy. I...
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...