Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...