The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
This paper describes the design and implementation of the Office Assistant – an agent that interacts with visitors at the office door and manages the office owner’s schedule. ...
Permanent involvement of end users in software development is both highly recommended and highly challenging. Against the background of our results and experiences from two resear...
Today's disruptive approaches to rearchitecting the Internet, e.g., Clean Slate Networking initiatives require testbeds that present unprecedented flexibility to the experimen...
Dan Levin, Andreas Wundsam, Amir Mehmood, Anja Fel...