Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Context-awareness refers to systems that unobtrusively adapt to the environment of their users on the basis of context information, popularly known as contextaware systems. One inh...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...
National Statistical Agencies routinely release large amounts of tabular information. Prior to dissemination, tabular data needs to be processed to avoid the disclosure of individ...