Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Process?aware information systems have to be frequently adapted due to business process changes. One important challenge not adequately addressed so far concerns the evolution of ...
Stefanie Rinderle, Andreas Wombacher, Manfred Reic...
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Emerging Grid applications desire not only high bandwidth but also the ability to control the topology and traffic engineering of the underlying networks, through web service inte...
Hanxi Zhang, Michel Savoie, Scott Campbell, Sergi ...
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...