The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computing convex hull for a given set of points is one of the most explored problems in the area of computational geometry (CG). If the set of points is distributed among a set of parties who jointly wish to compute the convex hull, each party can send his points to every other party, and can then locally compute the hull using any of the existing algorithms in CG. However such an approach does not...
Upholding the privacy of data has gathered increased interest in the current industrial scenario. The databases that hold personal information and the individuals' choices of privacy are often subjected to attacks from mischievous sources which try to access undisclosed data. The means used to achieve such ends may be in the form of complex queries that combine sensitive data with the non-sensitive...
In order to protect individuals' privacy, the technique of k-anonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. Datafly is one such technique which generalizes the information up to a level in such a way that each individual is hidden among at least k-1 other individuals. But this technique sometimes over distorts the data which may render it useless...
Honeypots have been studied in the network domain for detection and information collection against external threats in the past few years. They lure a potential attacker by simulating resources having vulnerabilities and observing the behavior of a potential attacker to identify him before a damaging attack takes place. A lot of work has been done in the area of privacy and security in databases....
The objective of context honeypot is to identify a probable privacy violator before he actually succeeds in capturing desired precious information. We believe that in the environment of robust implementation of privacy policy, privacy breaches can occur only through masquerading. Success of context honeypot depends on efficient luring (by using lure messages) of probable privacy violator. Lure messages...
As a response to serious privacy concerns, various approaches have been proposed on privacy policy driven databases. However it is very difficult to provide robust privacy implementation. Privacy violation can still take place with some masquerading. In such a scenario, it is important to detect the violation. A solution for privacy violation detection based on malafide intension has been proposed...
Policy-based management of business systems is increasingly becoming the norm for autonomic computing since these systems can adapt to the changing needs and increasing complexity of the underlying organizations or enterprises. One of the vital characteristics of these systems is self-protection, ie., the ability to secure information and resources, by anticipating, detecting, identifying and protecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.