Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still ...
Data stream management systems have benn proposed to process transactional data. Access control mechanisms for data streams ensure that only the authorized parts of the streams are available to each user or role. Objects protected under ...
There has been significant interest in the development of anonymization schemes for publishing graph data. However, due to a strong correlation among users’ social identities, privacy is a major concern ...
Graphs are used for representing and understanding objects and their relationships for numerous applications such as social networks, semantic webs, and biological networks. Integrity assurance of data ...
The emergence of cloud computing infrastructure and semantic Web technologies has created unprecedented opportunities for composing large-scale business processes and workflow-based applications that span multiple ...
Infectious disease in humans occurs when an infecting agent impacts the immune system of an individual. The compromised individual shows symptoms of infection such as fever. Infections may occur occasionally to any individual but when an ...
Today, an increasing number of users use the Internet to manage their multimedia data regarding health-care, e-business, social networking, intelligent transportation systems, etc. The trend is further being fueled by an ever-growing number of companies and government agencies such as banks, hospitals and employers, managing users personal data in some form of online applications and databases. The aim is to save time and money, by streamlining and...