作者: 館長(zhǎng) 時(shí)間: 2025-3-21 20:32 作者: 艦旗 時(shí)間: 2025-3-22 02:54 作者: DECRY 時(shí)間: 2025-3-22 05:35 作者: Flagging 時(shí)間: 2025-3-22 10:50
A kernelized architecture for multilevel secure application policies,tities and the security policy specifies how these labels may change. Building on previous results, this paper develops a model for a kernelized framework for supporting these policies. The framework provides the basis for, what is essentially, an interpreter of multilevel programs: programs that ma作者: 哎呦 時(shí)間: 2025-3-22 14:12
Dealing with multi-policy security in large open distributed systems,erent possibly inconsistent security policies..This paper proposes a practical solution for dealing with the coexistence of different security policies in distributed architectures. We introduce a model for specifying security policies in terms of security domains, access control and information flo作者: 哎呦 時(shí)間: 2025-3-22 18:09
A flexible method for information system security policy specification,ecification method, corresponding to the specific needs of organizations. First, we outline the overall guidelines of the security policy definition process, and the different consistency issues associated to the description of the security requirements of an organization information system. The spe作者: 饑荒 時(shí)間: 2025-3-23 00:43
Side channel cryptanalysis of product ciphers,ttacks and the vulnerabilities they introduce, demonstrate side-channel attacks against three product ciphers—timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES—and then generalize our research to other cryptosystems.作者: 地牢 時(shí)間: 2025-3-23 03:18 作者: 書(shū)法 時(shí)間: 2025-3-23 09:00 作者: 提煉 時(shí)間: 2025-3-23 11:33
Authorization in CORBA security,he Object Management Group published a security service specification called CORBA Security to handle security in object systems that conform to the Object Management Architecture. This paper provides a rigorous definition of the authorization part of CORBA Security. Its semantics is given in terms 作者: 討厭 時(shí)間: 2025-3-23 16:37
Rules for designing multilevel Object-Oriented Databases,the design of multilevel OODBs. In an OODB, data are organized in a complex structure built using different constructs (classes, objects, attributes, links ...). Therefore, a first problem is to determine what constructs of the object-oriented model should be associated with a security level. A seco作者: 驚奇 時(shí)間: 2025-3-23 19:49 作者: Obliterate 時(shí)間: 2025-3-23 22:26 作者: AGGER 時(shí)間: 2025-3-24 04:27
EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets,cations among EUROMED participants by establishing Trusted Third Party Services (TTPs) over the Web. Java technology plays an important role in EUROMED. In this paper, the threats that Java technology introduces to EUROMED are explored and security countermeasures are proposed, utilizing the TTP inf作者: Criteria 時(shí)間: 2025-3-24 06:48 作者: Erythropoietin 時(shí)間: 2025-3-24 12:46 作者: 是比賽 時(shí)間: 2025-3-24 18:01 作者: 轎車(chē) 時(shí)間: 2025-3-24 20:27 作者: obscurity 時(shí)間: 2025-3-24 23:49
Anne M. Lipton,Cindy D. Marshalle have also to be careful with the inference problems which may occur due to the integrity constraints inherent in the object-oriented paradigm. Therefore, a last purpose of this paper is to define a set of general rules to cope with this problem.作者: 反應(yīng) 時(shí)間: 2025-3-25 03:32
https://doi.org/10.1007/978-94-010-1598-1PEG encoders which are necessary to accommodate these PTY-Marks. Based on tests we comment on their feasibility. Detection of watermarks without secrets is very reminiscent of “public-key” cryptography. We discuss this relationship by contrasting PTY-marks with pixelwatermarking.作者: Aerophagia 時(shí)間: 2025-3-25 09:54 作者: Aspirin 時(shí)間: 2025-3-25 14:24 作者: sclera 時(shí)間: 2025-3-25 17:06 作者: AWL 時(shí)間: 2025-3-25 21:28
https://doi.org/10.1007/978-94-007-7272-4 of a process in a secure environment. Using this method, we propose various techniques to generate either fixed-length or variable-length patterns. We show the advantages and drawbacks of each technique, based on the results of the experiments we have run on our testbed.作者: 卜聞 時(shí)間: 2025-3-26 00:46
Fixed vs. variable-length patterns for detecting suspicious process behavior, of a process in a secure environment. Using this method, we propose various techniques to generate either fixed-length or variable-length patterns. We show the advantages and drawbacks of each technique, based on the results of the experiments we have run on our testbed.作者: 窩轉(zhuǎn)脊椎動(dòng)物 時(shí)間: 2025-3-26 08:11
Conference proceedings 1998elgium, in September 1998..The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobi作者: ESO 時(shí)間: 2025-3-26 09:33
https://doi.org/10.1007/978-94-007-7272-4ping system administrators eliminate vulnerable programs before they are exploited. A fully working prototype for HP-UX and Linux systems is currently available. Extensions are planned for other Unix versions.作者: 全神貫注于 時(shí)間: 2025-3-26 12:40 作者: 加入 時(shí)間: 2025-3-26 20:35 作者: 憤憤不平 時(shí)間: 2025-3-26 22:01
Society, Politics, and Religion,he project. Next the DHWM key exchange is presented, based on the simple idea that watermarking and verification can be separated. This scheme uses the Diffie-Hellman key-exchange protocol. Next some hints on the implementation of the scheme and on its correctness are given.作者: chisel 時(shí)間: 2025-3-27 03:55
A tool for pro-active defense against the buffer overrun attack,ping system administrators eliminate vulnerable programs before they are exploited. A fully working prototype for HP-UX and Linux systems is currently available. Extensions are planned for other Unix versions.作者: Fabric 時(shí)間: 2025-3-27 07:33
Byte code verification for Java smart cards based on model checking,check of a digital signature..This paper concentrates on Java smart cards, where resource limitations inhibit fully-fledged byte code verification within the client, but the demand for security is very high. However, our approach can also be applied to other variants of Java.作者: Freeze 時(shí)間: 2025-3-27 12:34 作者: 銼屑 時(shí)間: 2025-3-27 14:27 作者: fallible 時(shí)間: 2025-3-27 20:51
A kernelized architecture for multilevel secure application policies,nipulate multilevel label data-structures. This enables application functionality and security concerns to be developed separately, bringing with it the advantages of a separation of concerns paradigm.作者: quiet-sleep 時(shí)間: 2025-3-27 22:18 作者: Morsel 時(shí)間: 2025-3-28 03:44
A flexible method for information system security policy specification,cification language used is based on a convenient extension of deontic logic. The formalism and its extensions are defined briefly. To illustrate the use of this formalism, the paper presents how the method applies to the description of the security requirements of a real organization: a medium-size bank agency.作者: 被告 時(shí)間: 2025-3-28 07:29
On the security of digital tachographs,the level of enforcement generally. We conclude that the proposed new regime will be extremely vulnerable to the wholesale forgery of smartcards and to system-level manipulation, which in turn could lead to a large-scale breakdown in control. We present this as an interesting and important problem to the security community.作者: aspersion 時(shí)間: 2025-3-28 13:05 作者: enumaerate 時(shí)間: 2025-3-28 18:31 作者: 表示向前 時(shí)間: 2025-3-28 19:39
0302-9743 ntrol modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.978-3-540-65004-1978-3-540-49784-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: MODE 時(shí)間: 2025-3-29 01:21 作者: wreathe 時(shí)間: 2025-3-29 06:35 作者: Endometrium 時(shí)間: 2025-3-29 10:31
https://doi.org/10.1007/978-3-642-25215-0w rules. Then, we identify the set of operators for combining the specifications of sub-policies and we address the validity of the resulting policy according to the security properties of the sub-policies.作者: 悠然 時(shí)間: 2025-3-29 14:55 作者: Tracheotomy 時(shí)間: 2025-3-29 15:47
The Common Lisp Condition Systemthe level of enforcement generally. We conclude that the proposed new regime will be extremely vulnerable to the wholesale forgery of smartcards and to system-level manipulation, which in turn could lead to a large-scale breakdown in control. We present this as an interesting and important problem to the security community.作者: 粗俗人 時(shí)間: 2025-3-29 21:51 作者: Ptosis 時(shí)間: 2025-3-30 00:12 作者: emission 時(shí)間: 2025-3-30 04:53
Jean-Jacques Quisquater,Yves Deswarte,Dieter GollmIncludes supplementary material: 作者: 發(fā)電機(jī) 時(shí)間: 2025-3-30 09:25
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233879.jpg作者: CRATE 時(shí)間: 2025-3-30 13:27
https://doi.org/10.1007/978-94-007-7272-4ntrusion detection purposes. In a previous work, we presented a novel method to generate input data sets that enable us to observe the normal behavior of a process in a secure environment. Using this method, we propose various techniques to generate either fixed-length or variable-length patterns. W作者: GLUT 時(shí)間: 2025-3-30 18:17
https://doi.org/10.1007/978-94-007-7272-4consequences of the C language data integrity philosophy. Since the late eighties, when computer security incidents started affecting the Internet, it has been clear that buffer overruns are a powerful threat to system security as they allow ordinary users to gain superuser privileges on Unix system作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-30 22:25
https://doi.org/10.1007/978-94-007-7272-4tities and the security policy specifies how these labels may change. Building on previous results, this paper develops a model for a kernelized framework for supporting these policies. The framework provides the basis for, what is essentially, an interpreter of multilevel programs: programs that ma作者: CLOT 時(shí)間: 2025-3-31 03:18 作者: dissolution 時(shí)間: 2025-3-31 05:02
https://doi.org/10.1007/978-3-642-25215-0ecification method, corresponding to the specific needs of organizations. First, we outline the overall guidelines of the security policy definition process, and the different consistency issues associated to the description of the security requirements of an organization information system. The spe作者: hypotension 時(shí)間: 2025-3-31 11:13 作者: 冷峻 時(shí)間: 2025-3-31 14:56
The Common Lisp Condition Systemvironmental enforcement to the prevention of fraud. Their effectiveness is under threat from increasing levels of sophisticated fraud and manipulation. We examine this in the context of recent EU proposals to move to smartcard-based tachograph systems, which are aimed at cutting fraud and improving 作者: 拍下盜公款 時(shí)間: 2025-3-31 21:19 作者: ferment 時(shí)間: 2025-4-1 00:05 作者: 母豬 時(shí)間: 2025-4-1 05:48 作者: iodides 時(shí)間: 2025-4-1 06:29 作者: 你敢命令 時(shí)間: 2025-4-1 13:15 作者: 向下五度才偏 時(shí)間: 2025-4-1 16:34
Making the Most of the Doctor’s Visitcations among EUROMED participants by establishing Trusted Third Party Services (TTPs) over the Web. Java technology plays an important role in EUROMED. In this paper, the threats that Java technology introduces to EUROMED are explored and security countermeasures are proposed, utilizing the TTP inf作者: Kindle 時(shí)間: 2025-4-1 21:31