We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
One possible escape from the Gibbard-Satterthwaite theorem is computational complexity. For example, it is NP-hard to compute if the STV rule can be manipulated. However, there is...
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
We are developing a set of ontologies that deal with vector-borne diseases and the arthropod vectors that transmit them. For practical reasons (application priorities), we initiat...