Showing 1 - 10 of 776
Advances in information technology, and its use in research, are increasing both the need for anonymized data and the risks of poor anonymization. In this thesis, we point out some questions raised by current anonymization techniques such as (a) support for additional adversary models and the...
The success of role-based access control both within the research community and industry is undeniable. One of the main reasons for RBAC's adoption is its ability to reduce administration costs, help eliminate errors, and improve the security of a system. Before these advantages can be observed,...
In this information age, data and knowledge extracted by data mining techniques represent a key asset driving research, innovation, and policy-making activities. Many agencies and organizations have recognized the need of accelerating such trends and are therefore willing to release the data...
This dissertation investigates the problem of developing models and mechanisms for user authorization based on uncertain evidence and dynamic trust. The research directions are modeling dynamic trust, modeling uncertain evidence, and integrating them with role assignment for user authorization....
Resource allocation is one of the most widely addressed topics in computer science. Its importance lies with the role it has in providing a foundation for building systems and applications, and with its focus on using the resources available in the environment in an efficient way. While,...
In recent years leading-edge financial institutions routinely use advanced analytical and numerical techniques from science and engineering to create, deploy, and manage new financial instruments. The proliferation and complexity of the available financial instruments in conjunction with the...