A great success of Wireless Sensor Networks (WSNs). Recent advances in Wireless Sensor Network technologies provide people the ability to better understand the physical world. With the data collected from the entire network, the sensor network supports a variety of applications, including security surveillance, localization, information enquiry, and transmission. The ubiquitous data collection by mobile […]
Sq: Sequential Clustering for Privacy preserving data anonymization
This paper presents sequential clustering algorithms for anonymizing social networks. Those algorithms produce anonymizations by means of clustering with better utility than those achieved by existing algorithms. We devised a secure distributed version of our algorithms for the case in which the network data is split between several players. We focused on the scenario in […]
Facilitates systematic detection and resolution of XACML policy anomalies
In this paper, we represent an innovative policy anomaly analysis approach for Web access control policies, focusing on XACML (eXtensible Access Control Markup Language) policy.We introduce a policy based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions, along with an intuitive visualization representation of analysis results. We also discuss a proof-of-concept […]
Authorization Security model conceived to secure access to Semantic repositories
Most semantic repositories are designed to manage semantic models but do not deal with access rights. As in the case of databases that are traditional, data stored inside a semantic database should be protected. by granting access to authorized users only. Semantic models help in achieving semantic interoperability among sources of data and applications. The […]
A novel method to extract features for iris recognition system
IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode […]
Robust Face-Name Graph Matching for Movie Character Identification
Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises […]