Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
We present a new class of statistical deanonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. ...
Web applications design methodologies hold the promise of engineering high-quality and long-lived Web systems and rich Internet applications. However, many such methodologies focu...
Damiano Distante, Scott R. Tilley, Gerardo Canfora
With the development and maturity of ServiceOriented Architectures (SOA) to support business-tobusiness transactions, organizations are implementing Web services to expose their p...
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao