This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...