標題: Titlebook: Data and Applications Security XXI; 21st Annual IFIP WG Steve Barker,Gail-Joon Ahn Conference proceedings 2007 IFIP International Federati [打印本頁] 作者: PED 時間: 2025-3-21 19:16
書目名稱Data and Applications Security XXI影響因子(影響力)
書目名稱Data and Applications Security XXI影響因子(影響力)學(xué)科排名
書目名稱Data and Applications Security XXI網(wǎng)絡(luò)公開度
書目名稱Data and Applications Security XXI網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data and Applications Security XXI被引頻次
書目名稱Data and Applications Security XXI被引頻次學(xué)科排名
書目名稱Data and Applications Security XXI年度引用
書目名稱Data and Applications Security XXI年度引用學(xué)科排名
書目名稱Data and Applications Security XXI讀者反饋
書目名稱Data and Applications Security XXI讀者反饋學(xué)科排名
作者: Grasping 時間: 2025-3-21 22:57
Measuring the Overall Security of Network Configurations Using Attack GraphsWe consider two concrete cases. The first case assumes the domain of attack resistance to be real number and the second case represents resistances as a set of initial security conditions. We show that the proposed metric satisfies desired properties and that it adheres to common sense. At the same 作者: 到婚嫁年齡 時間: 2025-3-22 00:52 作者: ANIM 時間: 2025-3-22 05:41
Conference proceedings 2007is due to the e?orts of many individuals. We would like to thank all of the researchers that submitted - pers to DBSEC for consideration, and the Program Committee members and additional reviewers for making the review process fair and thorough, and for providing valuable suggestions on each submiss作者: attenuate 時間: 2025-3-22 10:05 作者: 偽書 時間: 2025-3-22 14:55 作者: 偽書 時間: 2025-3-22 17:21
https://doi.org/10.1007/978-1-4471-3700-9We consider two concrete cases. The first case assumes the domain of attack resistance to be real number and the second case represents resistances as a set of initial security conditions. We show that the proposed metric satisfies desired properties and that it adheres to common sense. At the same 作者: CANT 時間: 2025-3-23 01:07 作者: brassy 時間: 2025-3-23 03:54
Confidentiality Policies for Controlled Query Evaluationr the answer to that query would enable the user to infer any information he is not allowed to know according to some specified confidentiality policy. If this is the case, the answer is distorted, either by refusing to answer or by returning a modified answer. In this paper, we consider incomplete 作者: Armada 時間: 2025-3-23 07:05
Provably-Secure Schemes for Basic Query Support in Outsourced Databases allows users to store sensitive data on a remote, untrusted server and retrieve desired parts of it on request. At first we focus on basic, exact-match query functionality, and then extend our treatment to prefix-matching and, to a more limited extent, range queries as well. We propose several sear作者: BRIEF 時間: 2025-3-23 12:12 作者: 長處 時間: 2025-3-23 15:17
Location Privacy Protection Through Obfuscation-Based Techniques a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling for more sophisticated solutions for providing users 作者: wreathe 時間: 2025-3-23 19:24 作者: 火花 時間: 2025-3-23 23:25 作者: thalamus 時間: 2025-3-24 05:56 作者: 代理人 時間: 2025-3-24 06:30 作者: upstart 時間: 2025-3-24 14:35
Measuring the Overall Security of Network Configurations Using Attack Graphssecurity of a network system cannot simply be determined based on the number of vulnerabilities. To quantitatively assess the security of networked systems, one must first understand which and how vulnerabilities can be combined for an attack. Such an understanding becomes possible with recent advan作者: Root494 時間: 2025-3-24 16:44
Enforcing Honesty in Assured Information Sharing Within a Distributed Systemrties attempt to share data, there is not necessarily any guarantee that the participants will share data truthfully. In fact, there is often a large incentive to engage in behavior that can sabotage the effectiveness of such a system. We analyze these situations in light of game theory, a mathemati作者: modish 時間: 2025-3-24 20:55 作者: Ceremony 時間: 2025-3-25 01:58 作者: NOVA 時間: 2025-3-25 04:27 作者: 賞錢 時間: 2025-3-25 08:23
Design and Analysis of Querying Encrypted Data in Relational Databasesta in an encrypted format entails non-negligible performance penalties while processing queries. In this paper, we address several design issues related to querying encrypted data in relational databases. Based on our experiments, we propose new and efficient techniques to reduce the cost of cryptog作者: exorbitant 時間: 2025-3-25 11:42
Dynamic Event-Based Access Control as Term Rewriting may not be especially well suited and for which implementations of RBAC do not enable properties of access control policies to be adequately defined and proven. To address these issues, we propose a form of access control model that is based upon the key notion of an event. The access control model作者: craving 時間: 2025-3-25 18:24
A Spatio-temporal Role-Based Access Control Model access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed that increases the security of the application and ensur作者: 結(jié)束 時間: 2025-3-25 23:40 作者: Conjuction 時間: 2025-3-26 00:26
New Paradigm of Inference Control with Trusted Computingl users who query the protected database. As a result, most auditing methods, though rigorously studied, can never be implemented in practice for protecting largescale real-world database systems. To shift this paradigm, we propose a new inference control architecture that will entrust inference con作者: DEMN 時間: 2025-3-26 05:21
Security Patterns for Physical Access Control Systems, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to take this convergence at a more abstract level first作者: Herpetologist 時間: 2025-3-26 09:36 作者: groggy 時間: 2025-3-26 16:40 作者: 哪有黃油 時間: 2025-3-26 20:10 作者: anthesis 時間: 2025-3-26 22:57 作者: adumbrate 時間: 2025-3-27 04:33 作者: 聚集 時間: 2025-3-27 06:46
R. Asher Hasson,Johann A. Makowskyvent data, generated by low capability sensor devices, to more capable processing points and vice versa, needs to be addressed for the success of the ECA paradigm in this environment. The problem becomes interesting because strong cryptographic techniques for achieving integrity impose unacceptable 作者: cultivated 時間: 2025-3-27 12:48
Alberto O. Mendelzon,Carlos G. Mendioroz. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically to all the databases, instead of manually writing a query to each database. In a centrally mediated architecture a query is written in terms of a global schema or ontology that integ作者: employor 時間: 2025-3-27 14:27 作者: 保存 時間: 2025-3-27 18:59
https://doi.org/10.1007/978-1-4471-3700-9security of a network system cannot simply be determined based on the number of vulnerabilities. To quantitatively assess the security of networked systems, one must first understand which and how vulnerabilities can be combined for an attack. Such an understanding becomes possible with recent advan作者: 含鐵 時間: 2025-3-27 23:31 作者: 煩擾 時間: 2025-3-28 04:05 作者: dragon 時間: 2025-3-28 07:23
https://doi.org/10.1007/1-4020-0613-6 may require strong authentication from a large population of users. Since the users may not be able to adequately protect their cryptographic credentials, our service leverages some better protected servers to help fulfill such authentication needs. Compared with previous proposals, our service has作者: 否決 時間: 2025-3-28 14:07 作者: Interdict 時間: 2025-3-28 18:11
https://doi.org/10.1007/1-4020-0613-6ta in an encrypted format entails non-negligible performance penalties while processing queries. In this paper, we address several design issues related to querying encrypted data in relational databases. Based on our experiments, we propose new and efficient techniques to reduce the cost of cryptog作者: frozen-shoulder 時間: 2025-3-28 21:00
https://doi.org/10.1007/1-4020-0613-6 may not be especially well suited and for which implementations of RBAC do not enable properties of access control policies to be adequately defined and proven. To address these issues, we propose a form of access control model that is based upon the key notion of an event. The access control model作者: bronchodilator 時間: 2025-3-29 01:18
Arijit Ukil,Jaydip Sen,Sumit Ghosh access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed that increases the security of the application and ensur作者: Pathogen 時間: 2025-3-29 07:04
Wanting Hu,Qingfeng Wu,Zhiling Zhang,Lu Caorol model–Times-based Usage Control (TUCON). TUCON extends traditional and temporal access control models with times-based usage control by defining the maximum times that a privilege can be exercised. When the usage times of a privilege is consumed to zero or the time interval of the usage is expir作者: offense 時間: 2025-3-29 08:59
Lei Xiangdong,Lei Zhenyang,Long Junl users who query the protected database. As a result, most auditing methods, though rigorously studied, can never be implemented in practice for protecting largescale real-world database systems. To shift this paradigm, we propose a new inference control architecture that will entrust inference con作者: diskitis 時間: 2025-3-29 12:41 作者: initiate 時間: 2025-3-29 18:43 作者: Folklore 時間: 2025-3-29 22:14
Data and Applications Security XXI978-3-540-73538-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 河流 時間: 2025-3-30 03:16 作者: crucial 時間: 2025-3-30 08:08
https://doi.org/10.1007/978-3-540-73538-0Information; Trusted Computing; auditing; configuration; cryptography; data security; database security; di作者: instulate 時間: 2025-3-30 10:05
978-3-540-73533-5IFIP International Federation for Information Processing 2007作者: 一美元 時間: 2025-3-30 14:15 作者: Dendritic-Cells 時間: 2025-3-30 16:33
R. A. Hasson,S. Markovitch,Y. Sellaightforward and intuitive way. Then, based on such location privacy preferences, we discuss a new solution, based on obfuscation techniques, which permits us to achieve, and quantitatively estimate through a metric, different degrees of location privacy.作者: Brain-Imaging 時間: 2025-3-30 22:41 作者: 表示向下 時間: 2025-3-31 01:14 作者: 暴行 時間: 2025-3-31 06:08 作者: thrombus 時間: 2025-3-31 11:02 作者: 他一致 時間: 2025-3-31 16:13 作者: Mucosa 時間: 2025-3-31 18:56
https://doi.org/10.1007/1-4020-0613-6 our infrastructure enables the deployment of alternative PDPs the service requestor can choose from. We employ a PKI to reflect the sufficient trust relation between the service provider and a potential PDP. Our work is carried out within the European research project Access-eGov that aims at a European-wide e-Government service platform.作者: Lamina 時間: 2025-4-1 00:53 作者: 柳樹;枯黃 時間: 2025-4-1 04:02
Arijit Ukil,Jaydip Sen,Sumit Ghoshtio-temporal information. We formalize the model by enumerating the constraints. This model can be used for applications where spatial and temporal information of a subject and an object must be taken into account before granting or denying access.作者: 變化 時間: 2025-4-1 06:58
Lei Xiangdong,Lei Zhenyang,Long Junic protocol is proposed to formalize the interactions between the users platform and database server. Any existing inference control technique can work with our protocol, for which the security properties are formally proven. Since each user’s platform enforces inference control for its own queries, our solution avoids the bottleneck.作者: 辯論的終結(jié) 時間: 2025-4-1 14:10 作者: 慢跑 時間: 2025-4-1 16:02 作者: 羊欄 時間: 2025-4-1 19:12
A Privacy-Enhanced Attribute-Based Access Control System our infrastructure enables the deployment of alternative PDPs the service requestor can choose from. We employ a PKI to reflect the sufficient trust relation between the service provider and a potential PDP. Our work is carried out within the European research project Access-eGov that aims at a European-wide e-Government service platform.作者: AGATE 時間: 2025-4-2 00:03
gVault: A Gmail Based Cryptographic Network File Systemmodel and key management techniques that ensure data confidentiality and integrity. An initial prototype of gVault is implemented to evaluate the feasibility of such a system. Our experiments indicate that the additional cost of security is negligible in comparison to the cost of data transfer.作者: antiquated 時間: 2025-4-2 05:48