In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...