Nowadays it is possible to disseminate information to the all world in real time using current communication tools supported mostly by the Internet. The work of several organizatio...
Publish/Subscribe is often regarded as a promising paradigm for Future Internet architectures. Its information oriented nature and its particular security features have stimulated ...
Nikos Fotiou, Giannis F. Marias, George C. Polyzos
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Abstract: In this paper we present an entropy based method to analyze complex systems. Systems are treated as black boxes, which only expose information by some specified paramete...
Hiding data values in privacy-preserving data mining (PPDM) protects information against unauthorized attacks while maintaining analytical data properties. The most popular models...