Learn More
Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and utility of released data. While it is well-understood how to release data based on counts and simple functions under this guarantee, it remains to provide general purpose techniques(More)
Privacy is a serious concern when microdata need to be released for ad hoc analyses. Simple de-identification has been shown to be inadequate , since privacy can be compromised when quasi-identifiers in a de-identified database are linked with publicly available information. To mitigate the problem, generalization and suppression based approaches (such(More)
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify what combinations of credentials a stranger must disclose in order to gain access to each local service or credential. We introduce the concept of a trust negotiation(More)
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts, a certain level of trust should be established. Each party should make sure that the other one is qualiied and can be trusted for the ongoing business. Property-based digital(More)
Business and military partners, companies and their customers, and other closely cooperating parties may have a compelling need to conduct sensitive interactions on line, such as accessing each other's local services and other local resources. Automated trust negotiation is an approach to establishing trust between parties so that such interactions can take(More)
Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually(More)
Lysosomal lipid accumulation, defects in membrane trafficking and altered Ca(2+) homoeostasis are common features in many lysosomal storage diseases. Mucolipin transient receptor potential channel 1 (TRPML1) is the principle Ca(2+) channel in the lysosome. Here we show that TRPML1-mediated lysosomal Ca(2+) release, measured using a genetically encoded(More)
Coalescence, meaning the tracker associates more than one trajectories to some targets while loses track for others, is a challenging problem for visual tracking of multiple targets, especially when similar targets move close or present oc-clusions. Existing approaches that are based on joint data association are confronted by the combinatorial complexity(More)
XML is widely recognized as the data interchange standard for tomorrow, because of its ability to represent data from a wide variety sources. Hence, XML is likely to be the format through which data from multiple sources is integrated.In this paper we study the problem of integrating XML data sources through correlations realized as join operations. A(More)