In this paper we describe the development and test of a futuristic health scenario that allows the seamless exchange of sensitive personal data. The scenario was used to elicit us...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user’s identity ...
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to a...
Xiaofeng Lu, Pan Hui, Don Towsley, Juahua Pu, Zhan...