Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Abstract--This paper presents a framework for privacypreserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the...
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Today‘s use of mobile phones is mostly for coordination purposes. It seems reasonable to assume that 3G and 4G high bandwidth systems will be used in a similar way. This paper th...