Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...