()-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
- Yao-Tung Tsou,
- Mansour Naser Alraja,
- Li-Sheng Chen,
- Yu-Hsiang Chang,
- Yung-Li Hu,
- Yennun Huang,
- Chia-Mu Yu,
- Pei-Yuan Tsai
Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
Cloud computing is a popular model for offering infinite storage resources for the users. In the present scenario, extremely sensitive data is stored in the third-party cloud service provider’s infrastructure. For instance, patients who have ...
An Event-B formal model for a system reconfiguration pattern and its instantiation: application to Web services compensation
System substitution can be defined as the capability to replace a system by another one that preserves the specification of the original one. It may be used for reconfiguration in various situations like failure management, maintenance or Web ...
QoS Prediction based on temporal information and request context
Due to the complex and dynamic nature of the Internet, the status of services and their qualities (QoS) change frequently. It is thus important to predict the service quality accurately at runtime from the user’s perspective. Traditional service ...
Guarded attribute grammars and publish/subscribe for implementing distributed collaborative business processes with high data availability
With the ever-increasing development of the Internet and the diversification of communication media, business processes of companies are increasingly collaborative and distributed. This contrasts with traditional solutions deployed for their ...