One of the objectives of e-Research is to help scientists to accomplish their research, including scientific experiments, more effectively and efficiently. Web services provide ...
Donglai Zhang, Paul D. Coddington, Andrew L. Wende...
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
Abstract. Most users of the WWW want their searches to be effective. Currently, there exists a wide variety of efficient syntactic tools that have can be used for search in the WWW...
Katia Wechsler, Jorge A. Baier, Miguel Nussbaum, R...
Widespread use of surveillance cameras in offices and
other business establishments, pose a significant threat to
the privacy of the employees and visitors. The challenge of
int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...