標(biāo)題: Titlebook: Data and Application Security; Developments and Dir Bhavani Thuraisingham,Reind Riet,Zahir Tari Book 2001 IFIP International Federation for [打印本頁] 作者: Denial 時間: 2025-3-21 17:33
書目名稱Data and Application Security影響因子(影響力)
書目名稱Data and Application Security影響因子(影響力)學(xué)科排名
書目名稱Data and Application Security網(wǎng)絡(luò)公開度
書目名稱Data and Application Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data and Application Security被引頻次
書目名稱Data and Application Security被引頻次學(xué)科排名
書目名稱Data and Application Security年度引用
書目名稱Data and Application Security年度引用學(xué)科排名
書目名稱Data and Application Security讀者反饋
書目名稱Data and Application Security讀者反饋學(xué)科排名
作者: 噴出 時間: 2025-3-21 22:52 作者: Largess 時間: 2025-3-22 02:13
Victor Bos,Harold Bruintjes,Stefano TonettaThis panel discussed various issues on web security and privacy including XML security, data mining for intrusion detection, and various other aspects including e-commerce security.作者: 單色 時間: 2025-3-22 04:49
XML Access Control Systems: A Component-Based Approach,We recently proposed an access control model for XML information that permits the definition of authorizations at a fine granularity. We here describe the design and implementation of an . based on the above-mentioned model. We also present the major issues arising when integrating it into the framework of a component-based Web server system.作者: 暴行 時間: 2025-3-22 10:47
Simulation And Analysis of Cryptographic Protocols,This paper integrates logic and process calculus components to permit the comprehensive simulation and analysis of cryptographic protocols. The approach permits proofs about the information transmitted in protocols as well as the behavior of participating principals.作者: Saline 時間: 2025-3-22 16:53 作者: Saline 時間: 2025-3-22 20:44
,Distributed Policies for Data Management — Making Policies Mobile, as access control in these architectures. It introduces “Mobile Policy”(MoP) as a potential solution and presents a framework for using mobile policy in the business logic tier of multi-tier information systems.作者: 有幫助 時間: 2025-3-22 22:50 作者: neolith 時間: 2025-3-23 03:47
,Extending SQL’s Grant Operation to Limit Privileges,rant/revoke security model that allows a grantor to impose limitations on how the received privilege may be used. This extension also has a non-traditional implication for view security. Although our examples are from DBMSs, most results apply to arbitrary sets of privileges, in non-database software.作者: metropolitan 時間: 2025-3-23 09:27
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/d/image/263220.jpg作者: FEMUR 時間: 2025-3-23 10:06 作者: SOB 時間: 2025-3-23 14:51
978-1-4757-7502-0IFIP International Federation for Information Processing 2001作者: 來自于 時間: 2025-3-23 20:25 作者: Bureaucracy 時間: 2025-3-24 00:12
Lecture Notes in Computer Science as access control in these architectures. It introduces “Mobile Policy”(MoP) as a potential solution and presents a framework for using mobile policy in the business logic tier of multi-tier information systems.作者: DRAFT 時間: 2025-3-24 03:14 作者: debunk 時間: 2025-3-24 10:14 作者: 不利 時間: 2025-3-24 10:56 作者: 物質(zhì) 時間: 2025-3-24 16:33 作者: Cloudburst 時間: 2025-3-24 19:26
Wojciech S. Mokrzycki,Marek A. Samkoss and prevents any party from gaining advantage by quitting prematurely from the transaction or otherwise misbehaving. An important contribution of this protocol is that the dispute resolution is taken care of within the protocol itself and does not require manual intervention. Thus even if one of 作者: Talkative 時間: 2025-3-25 01:25 作者: ARENA 時間: 2025-3-25 05:37 作者: 積習(xí)難改 時間: 2025-3-25 11:27 作者: 煩擾 時間: 2025-3-25 12:32 作者: Fierce 時間: 2025-3-25 16:03
Using STPA in an ISO 26262 Compliant Processte signatures of all the files and store these signatures in a secure place. A malicious modification of a file can be detected by verifying the signature. This method, however, has the weakness that it cannot detect an attacker who has access to some of the files and the signatures (but not the sig作者: inflame 時間: 2025-3-25 20:20 作者: labyrinth 時間: 2025-3-26 02:40 作者: indicate 時間: 2025-3-26 04:41 作者: agnostic 時間: 2025-3-26 10:51 作者: SLAY 時間: 2025-3-26 12:59 作者: Mosaic 時間: 2025-3-26 20:07 作者: 屈尊 時間: 2025-3-26 21:40
https://doi.org/10.1007/978-3-319-66284-8. To enforce confidentiality the majority of previous works either advocates a violation of integrity or proposes pragmatically its preservation or restoration. In this work we argue that there can never be a trade-off between these two properties for integrity is a fundamental quality of every data作者: 推崇 時間: 2025-3-27 04:50 作者: 天空 時間: 2025-3-27 06:21 作者: V洗浴 時間: 2025-3-27 11:40 作者: 諂媚于性 時間: 2025-3-27 14:16 作者: 使饑餓 時間: 2025-3-27 19:03 作者: 無彈性 時間: 2025-3-28 01:06 作者: Offbeat 時間: 2025-3-28 05:57
Security Architecture of The Multimedia Mediator,ich enforces a previously reported approach to secure mediation. In this approach, a user submits cryptographically signed credentials containing both personal authorization attributes and his public encryption key, and data sources decide on the query access on the basis of shown personal authoriza作者: obeisance 時間: 2025-3-28 06:37
Authentic Third-Party Data Publication, must satisfy the integrity, authenticity, and non-repudiation requirements of clients. Providing this protection over public networks is costly..This is partly because building and running secure systems is hard. In practice, large systems can not be verified to be secure and are frequently penetra作者: GOAD 時間: 2025-3-28 13:56
Protecting File Systems Against Corruption Using Checksums,te signatures of all the files and store these signatures in a secure place. A malicious modification of a file can be detected by verifying the signature. This method, however, has the weakness that it cannot detect an attacker who has access to some of the files and the signatures (but not the sig作者: 攀登 時間: 2025-3-28 18:24 作者: 形容詞 時間: 2025-3-28 21:40 作者: colloquial 時間: 2025-3-29 00:36
,Wrappers – A Mechanism to Support State-Based Authorization in Web Applications,ence on proper protection. The second premise is that applications are generally too complex to be trusted to implement security as specified by the given security policy. These problems are aggravated if the application operates over normal time and space constraints: The best example of such appli作者: 連累 時間: 2025-3-29 06:33
An Integrated Framework for Database Privacy Protection,generic database user. In this paper, we present a framework to assist in the formal analysis of the database inference problem. The framework is based on an association network which is composed of a similarity measure and a Bayesian network model.作者: 神圣不可 時間: 2025-3-29 10:14 作者: 愚蠢人 時間: 2025-3-29 13:10 作者: 裝勇敢地做 時間: 2025-3-29 18:59
Confidentiality vs Integrity in Secure Databases,. To enforce confidentiality the majority of previous works either advocates a violation of integrity or proposes pragmatically its preservation or restoration. In this work we argue that there can never be a trade-off between these two properties for integrity is a fundamental quality of every data作者: hemophilia 時間: 2025-3-29 23:12
,Extending SQL’s Grant Operation to Limit Privileges,rant/revoke security model that allows a grantor to impose limitations on how the received privilege may be used. This extension also has a non-traditional implication for view security. Although our examples are from DBMSs, most results apply to arbitrary sets of privileges, in non-database softwar作者: avulsion 時間: 2025-3-30 00:00 作者: 極少 時間: 2025-3-30 04:42
Jakub Smolka,Maria Skublewska-Paszkowskaorizations both at document type and document level; (ii) a differentiated protection of document/document type contents by supporting multi-granularity protection objects and positive/negative authorizations; (iii) a controlled propagation of authorizations among protection objects, by enforcing multiple propagation options.作者: Mosaic 時間: 2025-3-30 08:48
Ibrahim Habli,Mark Sujan,Friedemann Bitsch the multilevel security system of the federation, and the translation functions between each ordered set belonging to each component database and the federated ordered set as well. The proposed methodology also includes a way to solve the problem of classification of the components of the Federated Schema generated during the integration process.作者: ALIBI 時間: 2025-3-30 15:32
Author-,: A Java-Based System For XML Data Protection,orizations both at document type and document level; (ii) a differentiated protection of document/document type contents by supporting multi-granularity protection objects and positive/negative authorizations; (iii) a controlled propagation of authorizations among protection objects, by enforcing multiple propagation options.作者: 松果 時間: 2025-3-30 16:40 作者: FLOUR 時間: 2025-3-30 22:36 作者: 小教堂 時間: 2025-3-31 01:33 作者: 幸福愉悅感 時間: 2025-3-31 07:17
Security Architecture of The Multimedia Mediator,tion attributes and return encrypted answers. The security module uniformly represents the query access authorizations of the sources, controls the intermediate usage of credentials, assists users in submitting appropriate credentials, selects and forwards credentials for subqueries, and exploits credentials for query optimization.作者: 執(zhí) 時間: 2025-3-31 10:00
Confidentiality vs Integrity in Secure Databases,base, ie also a secure one. Confidentiality always implies a kind of distortion of the open database. We introduce a formally sound method for its enforcement which relies on aliases, ie, additional tuples the only purpose of which is the preservation of integrity of both the open database and each distortion of it.作者: 愛了嗎 時間: 2025-3-31 15:55
Book 2001 the rapid growth of the internet and theworld wide web, data and applications security will always be a keytopic in industry as well as in the public sector, and hasimplications for the whole of society. ..Data and Applications Security. covers issues related to securityand privacy of information i作者: largesse 時間: 2025-3-31 20:45
Lecture Notes in Computer Scienceication of security requirements to be exploited to help to improve the efficiency of query evaluation, and naturally extends to enable deductive databases to be protected against unauthorized update and revision requests.作者: contrast-medium 時間: 2025-4-1 00:32 作者: Ige326 時間: 2025-4-1 02:32
Wojciech S. Mokrzycki,Marek A. SamkoAt the same time it ensures that the customer receives the product if and only if the merchant gets paid for the product. All these features are achieved without significantly increasing the communication overhead or interactions with the third party as compared with similar protocols.作者: 鉆孔 時間: 2025-4-1 07:57 作者: 小爭吵 時間: 2025-4-1 10:34
Dmitry Chetverikov,Renaud Péterior every combination of access rights held by collaborators is avoided. New classes of external collaborators can be added without requiring a reorganization of the entire information structure. There is no overhead for internal use, i.e., for participants that are wholly trusted. Finally, since doc作者: 出處 時間: 2025-4-1 17:54
Fingerprint Orientation Field Enhancement architecture provides obvious benefits. Security policies can be constructed from off-the-shelf components, supporting a diverse array of security needs. Before this or a similar architecture can be accepted by the industry, the concept must be proven to work theoretically and practically. Olivier 作者: Little 時間: 2025-4-1 22:01
Maryam Raiyat Aliabadi,Karthik Pattabiramanrovide authenticity and non-repudiation of the answer to a database query. We . require a key to be held in an on-line system, thus reducing the impact of system penetrations. By allowing untrusted publishers, we also allow more scalable publication of large databases.