Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
— In this position paper, we motivate the need for streaming data integration in three main forms including across multiple streaming data sources, over multiple stream processin...
Abstract. As the number of web pages increases dramatically, the problem of the information overload becomes more severe when browsing and searching the WWW. To alleviate this prob...