標(biāo)題: Titlebook: Data and Applications Security XX; 20th Annual IFIP WG Ernesto Damiani,Peng Liu Conference proceedings 2006 IFIP International Federation [打印本頁(yè)] 作者: 全體 時(shí)間: 2025-3-21 17:47
書目名稱Data and Applications Security XX影響因子(影響力)
書目名稱Data and Applications Security XX影響因子(影響力)學(xué)科排名
書目名稱Data and Applications Security XX網(wǎng)絡(luò)公開度
書目名稱Data and Applications Security XX網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data and Applications Security XX被引頻次
書目名稱Data and Applications Security XX被引頻次學(xué)科排名
書目名稱Data and Applications Security XX年度引用
書目名稱Data and Applications Security XX年度引用學(xué)科排名
書目名稱Data and Applications Security XX讀者反饋
書目名稱Data and Applications Security XX讀者反饋學(xué)科排名
作者: 喧鬧 時(shí)間: 2025-3-21 21:33 作者: infringe 時(shí)間: 2025-3-22 00:53
https://doi.org/10.1007/11805588Administration; Information; Registry; Resolution; Semantic Web; XML; algorithm; algorithms; authentication; 作者: 易達(dá)到 時(shí)間: 2025-3-22 04:48
978-3-540-36796-3IFIP International Federation for Information Processing 2006作者: incubus 時(shí)間: 2025-3-22 11:21 作者: surmount 時(shí)間: 2025-3-22 13:52 作者: surmount 時(shí)間: 2025-3-22 20:40 作者: GROG 時(shí)間: 2025-3-22 23:10 作者: 流出 時(shí)間: 2025-3-23 04:14
Kai Ding,Andrey Morozov,Klaus Janschekle to attacks, it could produce incorrect query results. This paper introduces a mechanism for users to verify that their query answers on a . are correct, in the sense of being complete (i.e., no qualifying data points are omitted) and authentic (i.e., all the result values originated from the owne作者: abduction 時(shí)間: 2025-3-23 05:39
Smitha Gautham,Athira V. Jayakumar,Carl Elksg is a known technique for hiding copyrights marks within documents, thus preventing redistributions. Here, we introduce a watermarking algorithm for . streams so that (i) the watermark embedding and detection processes are done online and use only a constant memory, (ii) the stream distortion is co作者: 蝕刻術(shù) 時(shí)間: 2025-3-23 11:20
Safety-Critical Software Development in C++intain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent and fairly effective technique for executing SQL-style range queries over encrypted data involves partiti作者: browbeat 時(shí)間: 2025-3-23 14:43 作者: maintenance 時(shí)間: 2025-3-23 18:40
Ibrahim Habli,Mark Sujan,Friedemann Bitschthm to be developed and implemented, causing a delay in the availability of analysis. Such a delay is usually unacceptable because the needs for analyzing attack graphs may change rapidly in defending against network intrusions. An administrator may want to revise an analysis upon observing its outc作者: 文字 時(shí)間: 2025-3-23 23:51
Ibrahim Habli,Mark Sujan,Friedemann Bitschroduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by identity providers. An additional feature of our model is the avoidance of direct communications between identity providers and service providers, which provides improved privacy protection for 作者: 不愿 時(shí)間: 2025-3-24 04:20
Lecture Notes in Computer ScienceAC is more general than those traditional models as was shown by Osborn et al. [17], however, mapping a role based system to a valid MAC configuration is not always possible because certain combinations of permissions that are included in a role’s effective privileges may cause information flow. Giv作者: 人類 時(shí)間: 2025-3-24 08:43
Ibrahim Habli,Mark Sujan,Friedemann Bitschakage of recipients’ private information to message senders. The problem arises because some email-control mechanisms like bonds, graph-turing tests, ., inherently leak information, and without discontinuing their use, leakage channels cannot be closed. We formalize the capabilities of an attacker a作者: 束縛 時(shí)間: 2025-3-24 13:54
Felix Müller,Philipp Nenninger,Eric Sax access requests and for proving properties of an access control policy. We focus on two kinds of access control models: discretionary models, based on access control lists (ACLs), and role-based access control (RBAC) models. For RBAC models, we show that we can specify several variants, including m作者: atrophy 時(shí)間: 2025-3-24 14:58
Lecture Notes in Computer Scienceat personal information collected for one purpose may not be used for any other purpose without the specific . of the person it concerns. Although users provide personal information for use in one specific context, they often have no idea on how such a personal information may be used subsequently..作者: 混合,攙雜 時(shí)間: 2025-3-24 19:33 作者: visual-cortex 時(shí)間: 2025-3-25 01:42 作者: 和音 時(shí)間: 2025-3-25 04:50
Megha Quamara,Christina Kolb,Brahim Hamid different models are applicable (e.g., RBAC in organizations, MAC in the military field). An authorization model contains all necessary elements needed for the decision (e.g., subjects, objects, and roles) as well as their relations. As these elements are usually inherent in the software architectu作者: 無(wú)法治愈 時(shí)間: 2025-3-25 09:33
Creating Objects in the Flexible Authorization Framework,control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users. The results of a data processing may disclose information concerning the objects used in the data processing itself. Therefore, the control of information flow results fundamental to guar作者: GREEN 時(shí)間: 2025-3-25 15:09 作者: 修飾 時(shí)間: 2025-3-25 18:20 作者: 灌輸 時(shí)間: 2025-3-25 23:47 作者: 情感脆弱 時(shí)間: 2025-3-26 04:02
Authenticating Multi-dimensional Query Results in Data Publishing,le to attacks, it could produce incorrect query results. This paper introduces a mechanism for users to verify that their query answers on a . are correct, in the sense of being complete (i.e., no qualifying data points are omitted) and authentic (i.e., all the result values originated from the owne作者: 橡子 時(shí)間: 2025-3-26 06:41
, Streams Watermarking,g is a known technique for hiding copyrights marks within documents, thus preventing redistributions. Here, we introduce a watermarking algorithm for . streams so that (i) the watermark embedding and detection processes are done online and use only a constant memory, (ii) the stream distortion is co作者: 狼群 時(shí)間: 2025-3-26 11:13
Aggregation Queries in the Database-As-a-Service Model,intain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent and fairly effective technique for executing SQL-style range queries over encrypted data involves partiti作者: gain631 時(shí)間: 2025-3-26 13:44 作者: 憤世嫉俗者 時(shí)間: 2025-3-26 17:41 作者: 推崇 時(shí)間: 2025-3-26 23:23 作者: 庇護(hù) 時(shí)間: 2025-3-27 03:37 作者: 緩和 時(shí)間: 2025-3-27 07:39
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems,akage of recipients’ private information to message senders. The problem arises because some email-control mechanisms like bonds, graph-turing tests, ., inherently leak information, and without discontinuing their use, leakage channels cannot be closed. We formalize the capabilities of an attacker a作者: laxative 時(shí)間: 2025-3-27 11:16 作者: NIL 時(shí)間: 2025-3-27 16:48 作者: mydriatic 時(shí)間: 2025-3-27 19:08 作者: cipher 時(shí)間: 2025-3-28 00:29
A Framework for Flexible Access Control in Digital Library Systems, very dynamic and not completely known in advance. In addition, the objects stored in a digital library are characterized by fine-grained behavioral interfaces and highly-contextualized access restrictions that require a user’s access privileges to be updated dynamically. These motivate us to propos作者: 神經(jīng) 時(shí)間: 2025-3-28 04:46 作者: Awning 時(shí)間: 2025-3-28 07:52
Conference proceedings 2006sults, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have bec作者: 五行打油詩(shī) 時(shí)間: 2025-3-28 13:10 作者: Fraudulent 時(shí)間: 2025-3-28 17:19
Ibrahim Habli,Mark Sujan,Friedemann Bitsch her guess. We assume a constraint logic programming based policy language for specification and evaluation of mail acceptance criteria and present two different program transformations that can prevent guessing attacks while allowing recipients to utilize any email-control mechanism in their policies.作者: 光明正大 時(shí)間: 2025-3-28 19:26 作者: 轉(zhuǎn)向 時(shí)間: 2025-3-29 01:22 作者: Respond 時(shí)間: 2025-3-29 05:42 作者: 四目在模仿 時(shí)間: 2025-3-29 08:42 作者: 檢查 時(shí)間: 2025-3-29 15:21 作者: aggressor 時(shí)間: 2025-3-29 16:39 作者: Altitude 時(shí)間: 2025-3-29 20:43 作者: Hyperplasia 時(shí)間: 2025-3-30 01:20
Term Rewriting for Access Control,n access control lists (ACLs), and role-based access control (RBAC) models. For RBAC models, we show that we can specify several variants, including models with role hierarchies, and constraints and support for security administrator review querying.作者: Armory 時(shí)間: 2025-3-30 06:59
Smitha Gautham,Athira V. Jayakumar,Carl Elksntrolled, (iii) the type of the stream is preserved and finally (iv) the detection procedure does not require the original stream. We also evaluate, analytically and experimentally, the robustness of the algorithm against watermark removal attempts.作者: 灌溉 時(shí)間: 2025-3-30 11:50
WiCAR - Simulating Towards the Wireless Carerent options of security label propagation and conflict resolution. Our second contribution is a generalized algorithm that constructs a full DTD annotation (from the the partial one) w.r.t. the policy classification. Finally, we discuss the query rewriting approach for our model of XML security views.作者: ABASH 時(shí)間: 2025-3-30 13:37
Lecture Notes in Computer ScienceIn this paper, we introduce a new type of privacy policy, called ., which defines how the personal information release will be (or should be) dealt with at the receiving party. A data handling policy allows users to define simple and appropriate levels of control over who sees what information about them and under which circumstances.作者: BRAND 時(shí)間: 2025-3-30 18:02 作者: 征兵 時(shí)間: 2025-3-30 22:57 作者: 思想 時(shí)間: 2025-3-31 02:21 作者: 逃避系列單詞 時(shí)間: 2025-3-31 06:39
Ibrahim Habli,Mark Sujan,Friedemann BitschSTMS). We also give a practical solution for mitigating aspects of the identity theft problem and discuss its use in our notarized federated identity management model. The unique feature of our cryptographic solution is that it enables one to proactively prevent the leaking of secret identity information.作者: 砍伐 時(shí)間: 2025-3-31 10:55
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation,abling the user to infer confidential information. We illustrate the semantics of the system by a comprehensive example and state the essential requirements for an inference-proof and highly available database. We present an algorithm that accomplishes the preprocessing by combining SAT solving and “Branch and Bound”.作者: definition 時(shí)間: 2025-3-31 14:02
Notarized Federated Identity Management for Web Services,STMS). We also give a practical solution for mitigating aspects of the identity theft problem and discuss its use in our notarized federated identity management model. The unique feature of our cryptographic solution is that it enables one to proactively prevent the leaking of secret identity information.作者: 平 時(shí)間: 2025-3-31 20:32
Conference proceedings 2006EC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practica作者: 間接 時(shí)間: 2025-3-31 23:29 作者: 銼屑 時(shí)間: 2025-4-1 03:03
Consolidating the Access Control of Composite Applications and Workflows, presented requirements of the least privileges paradigm and, thus, allow to revise and optimize the access control of composite applications. We demonstrate this by means of Web service workflows that constitute the state of the art for the realization of business processes.作者: ARCHE 時(shí)間: 2025-4-1 10:00
Authenticating Multi-dimensional Query Results in Data Publishing, approach: Verifiable KD-tree (VKDtree) that is based on space partitioning, and Verifiable R-tree (VRtree) that is based on data partitioning. The schemes are evaluated on window queries, and results show that VRtree is highly precise, meaning that few data points outside of a query result are disc