Background: High-throughput methods that allow for measuring the expression of thousands of genes or proteins simultaneously have opened new avenues for studying biochemical proce...
Andreas Keller, Christina Backes, Maher Al-Awadhi,...
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Taking into account the constantly increasing number of educational resources available on the Web, the problem arising is to determine who is authorized to access these resources...