標(biāo)題: Titlebook: Data and Applications Security XXIII; 23rd Annual IFIP WG Ehud Gudes,Jaideep Vaidya Conference proceedings 2009 IFIP International Federat [打印本頁(yè)] 作者: 佯攻 時(shí)間: 2025-3-21 19:44
書目名稱Data and Applications Security XXIII影響因子(影響力)
書目名稱Data and Applications Security XXIII影響因子(影響力)學(xué)科排名
書目名稱Data and Applications Security XXIII網(wǎng)絡(luò)公開度
書目名稱Data and Applications Security XXIII網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data and Applications Security XXIII被引頻次
書目名稱Data and Applications Security XXIII被引頻次學(xué)科排名
書目名稱Data and Applications Security XXIII年度引用
書目名稱Data and Applications Security XXIII年度引用學(xué)科排名
書目名稱Data and Applications Security XXIII讀者反饋
書目名稱Data and Applications Security XXIII讀者反饋學(xué)科排名
作者: 牲畜欄 時(shí)間: 2025-3-21 23:16 作者: 項(xiàng)目 時(shí)間: 2025-3-22 03:30
Conference proceedings 2009 Canada, in July 2009...The?18 revised full papers and 4 short papers were carefully reviewed and selected from?47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing..作者: Conspiracy 時(shí)間: 2025-3-22 05:20 作者: hemophilia 時(shí)間: 2025-3-22 11:57
978-3-642-03006-2IFIP International Federation for Information Processing 2009作者: 下級(jí) 時(shí)間: 2025-3-22 14:09
Chunling Hu,Dawei Li,Shuai Shaodatable databases. Within the framework of the lying approach to CQE, we study user update requests that have to be translated into a new database state. In order to avoid dangerous inferences, some such updates have to be denied even though the new database instance would be compatible with a set o作者: 下級(jí) 時(shí)間: 2025-3-22 18:54 作者: metropolitan 時(shí)間: 2025-3-23 00:36
Optimized Packing Soft Convex Polygonsrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach, whereby knowledge about the effectiveness of mitigating countermeasures is used to g作者: Simulate 時(shí)間: 2025-3-23 02:00 作者: HERE 時(shí)間: 2025-3-23 09:08 作者: CON 時(shí)間: 2025-3-23 11:40
https://doi.org/10.1007/978-3-030-87495-7mata evaluation we mean that one participant has a finite state machine and the other participant has a sequence, and at the end of the protocol the sequence owner learns whether the machine accepts the sequence. A protocol was given in [18], but it required .(.) rounds (where . is the number of cha作者: Insatiable 時(shí)間: 2025-3-23 16:04
https://doi.org/10.1007/978-3-030-87495-7y, not only contributes to the democratization of healthcare, by reaching far-away populations, but also makes it possible for elderly and chronically-ill patients to have their health monitored while in the comfort of their homes. Despite all of these advantages, however, patients are still resisti作者: 隱語(yǔ) 時(shí)間: 2025-3-23 18:21
https://doi.org/10.1007/978-3-030-87495-7alicious transactions. The model suggested in this paper considers three main factors: the quality of intrusion detection, the probability of intrusion, and the cost structure of an organization whose data is protected by the intrusion detection system. We developed a step by step approach that help作者: 騷擾 時(shí)間: 2025-3-24 00:14 作者: 帶傷害 時(shí)間: 2025-3-24 02:24
https://doi.org/10.1007/978-3-030-69839-3ul access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of作者: Incorporate 時(shí)間: 2025-3-24 10:15 作者: invert 時(shí)間: 2025-3-24 11:31
https://doi.org/10.1007/978-3-030-69839-3utomata and their derivatives. However Edit automata (EA) have been recently proposed to specify more powerful EMs. Being able to feign the execution of sensitive program actions, these EMs are supposed to enforce more security properties. However, feigning program actions will usually make the prog作者: 減震 時(shí)間: 2025-3-24 17:46 作者: Negligible 時(shí)間: 2025-3-24 20:09 作者: Resection 時(shí)間: 2025-3-25 02:32
Fatima Bekaddour,Chikh Mohammed Amineing layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients..In this paper, we address this issue and propose a novel mod作者: 涂掉 時(shí)間: 2025-3-25 05:41 作者: 單獨(dú) 時(shí)間: 2025-3-25 08:40 作者: Altitude 時(shí)間: 2025-3-25 13:48 作者: 赤字 時(shí)間: 2025-3-25 18:49
https://doi.org/10.1007/978-3-319-19578-0ds by patients - linked via health information exchange. There is an emergent need to provide secure access to information spread across multiple repositories for health care providers (e.g., physicians, nurses, home health aides, etc.) who collaborate with one another across cyberspace to deliver p作者: 刪除 時(shí)間: 2025-3-25 23:37 作者: vitrectomy 時(shí)間: 2025-3-26 01:56
Implementing Reflective Access Control in SQLAC aids the management of database access controls by improving the expressiveness of policies. The Transaction Datalog language provides a powerful syntax and semantics for expressing RDBAC policies, however there is no efficient implementation of this language for practical database systems. We de作者: Subjugate 時(shí)間: 2025-3-26 04:18 作者: 責(zé)問 時(shí)間: 2025-3-26 08:49 作者: 壁畫 時(shí)間: 2025-3-26 14:54
Towards System Integrity Protection with Graph-Based Policy Analysisa system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to the high complexity of policy configurations in contem作者: 不遵守 時(shí)間: 2025-3-26 20:17
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluationmata evaluation we mean that one participant has a finite state machine and the other participant has a sequence, and at the end of the protocol the sequence owner learns whether the machine accepts the sequence. A protocol was given in [18], but it required .(.) rounds (where . is the number of cha作者: 喚醒 時(shí)間: 2025-3-27 00:26
Privacy-Preserving Telemonitoring for eHealthy, not only contributes to the democratization of healthcare, by reaching far-away populations, but also makes it possible for elderly and chronically-ill patients to have their health monitored while in the comfort of their homes. Despite all of these advantages, however, patients are still resisti作者: CLAP 時(shí)間: 2025-3-27 02:29 作者: drusen 時(shí)間: 2025-3-27 06:35 作者: myriad 時(shí)間: 2025-3-27 10:51
Distributed Privilege Enforcement in PACSul access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of作者: 必死 時(shí)間: 2025-3-27 17:20 作者: neologism 時(shí)間: 2025-3-27 20:06 作者: defuse 時(shí)間: 2025-3-27 22:43
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providerssuch data sharing is subject to constraints imposed by privacy of individuals or data subjects as well as data confidentiality of institutions or data providers. Concretely, given a query spanning multiple databases, query results should not contain individually identifiable information. In addition作者: figurine 時(shí)間: 2025-3-28 06:05
Detecting Inference Channels in Private Multimedia Data , Social Networkses to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addr作者: 高度 時(shí)間: 2025-3-28 07:08
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clientsing layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients..In this paper, we address this issue and propose a novel mod作者: 戲法 時(shí)間: 2025-3-28 13:44
Data Is Key: Introducing the Data-Based Access Control Paradigmwe suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given . pieces of data, an agent is able to recover all . items once she knows . of 作者: 引水渠 時(shí)間: 2025-3-28 15:58 作者: 兩棲動(dòng)物 時(shí)間: 2025-3-28 20:59
PAES: Policy-Based Authority Evaluation Schemelar functionalities and often have two shortcomings: a centralised architecture and a lack of concern for the trust and privacy of data recipients. To access the data, recipients must present their credentials to a policy evaluation authority, which they cannot choose and may not trust. Furthermore,作者: 玩忽職守 時(shí)間: 2025-3-29 02:25 作者: 兒童 時(shí)間: 2025-3-29 06:16 作者: 否認(rèn) 時(shí)間: 2025-3-29 07:22 作者: 高爾夫 時(shí)間: 2025-3-29 13:28 作者: cumulative 時(shí)間: 2025-3-29 19:28 作者: Inscrutable 時(shí)間: 2025-3-29 21:05
https://doi.org/10.1007/978-3-030-69839-3on to ensure anonymity of data providers in addition to that of data subjects, and a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database while maintaining both privacy constraints.作者: 逃避現(xiàn)實(shí) 時(shí)間: 2025-3-30 00:07
Fatima Bekaddour,Chikh Mohammed Aminee remaining information in clear form at the external (honest-but-curious) server. We model the problem and provide a solution for it aiming at minimizing the data stored at the client. We also illustrate the execution of queries on the fragmented information.作者: 使更活躍 時(shí)間: 2025-3-30 07:28
An Approach to Security Policy Configuration Using Semantic Threat Graphsoach to representing and reasoning over this knowledge is taken. A case study on Network Access Controls demonstrates how threats can be analyzed and how automated configuration recommendations can be made based on catalogues of best-practice countermeasures.作者: extinguish 時(shí)間: 2025-3-30 10:52 作者: 憤慨點(diǎn)吧 時(shí)間: 2025-3-30 13:59 作者: Feckless 時(shí)間: 2025-3-30 20:22
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providerson to ensure anonymity of data providers in addition to that of data subjects, and a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database while maintaining both privacy constraints.作者: 慢慢沖刷 時(shí)間: 2025-3-30 23:56 作者: 形狀 時(shí)間: 2025-3-31 02:25 作者: 不能約 時(shí)間: 2025-3-31 05:43 作者: 多山 時(shí)間: 2025-3-31 13:14
Francisco de Asis López-Fuentesuirements which specify the reaction policy to enforce when intrusions are detected. We present in this article an extension of the OrBAC model by defining dynamic organizations and threat contexts to enable the expression and enforcement of reaction requirements.作者: Badger 時(shí)間: 2025-3-31 17:26 作者: GRATE 時(shí)間: 2025-3-31 19:43 作者: Flu表流動(dòng) 時(shí)間: 2025-4-1 00:08
https://doi.org/10.1007/978-3-030-69839-3 failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants. Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead.作者: 不可救藥 時(shí)間: 2025-4-1 05:07
Habib Mahi,Nezha Farhi,Kaouter Labedthem. The problem is similar to both secure sketches and secret sharing, and we show that both can be used as a basis for constructions. Examples of possible applications are granting access without credentials, recovering forgotten passwords and sharing personal data in social networks.作者: 反感 時(shí)間: 2025-4-1 07:03
https://doi.org/10.1007/978-3-319-19578-0atient care. Are available security models capable of supporting collaborative access where providers are simultaneously modifying a patient’s medical record? To address this question, this paper details collaborative security extensions to NIST RBAC.作者: Noctambulant 時(shí)間: 2025-4-1 12:19