Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...