派博傳思國(guó)際中心

標(biāo)題: Titlebook: Data and Applications Security XXIII; 23rd Annual IFIP WG Ehud Gudes,Jaideep Vaidya Conference proceedings 2009 IFIP International Federat [打印本頁(yè)]

作者: 佯攻    時(shí)間: 2025-3-21 19:44
書目名稱Data and Applications Security XXIII影響因子(影響力)




書目名稱Data and Applications Security XXIII影響因子(影響力)學(xué)科排名




書目名稱Data and Applications Security XXIII網(wǎng)絡(luò)公開度




書目名稱Data and Applications Security XXIII網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data and Applications Security XXIII被引頻次




書目名稱Data and Applications Security XXIII被引頻次學(xué)科排名




書目名稱Data and Applications Security XXIII年度引用




書目名稱Data and Applications Security XXIII年度引用學(xué)科排名




書目名稱Data and Applications Security XXIII讀者反饋




書目名稱Data and Applications Security XXIII讀者反饋學(xué)科排名





作者: 牲畜欄    時(shí)間: 2025-3-21 23:16

作者: 項(xiàng)目    時(shí)間: 2025-3-22 03:30
Conference proceedings 2009 Canada, in July 2009...The?18 revised full papers and 4 short papers were carefully reviewed and selected from?47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing..
作者: Conspiracy    時(shí)間: 2025-3-22 05:20

作者: hemophilia    時(shí)間: 2025-3-22 11:57
978-3-642-03006-2IFIP International Federation for Information Processing 2009
作者: 下級(jí)    時(shí)間: 2025-3-22 14:09
Chunling Hu,Dawei Li,Shuai Shaodatable databases. Within the framework of the lying approach to CQE, we study user update requests that have to be translated into a new database state. In order to avoid dangerous inferences, some such updates have to be denied even though the new database instance would be compatible with a set o
作者: 下級(jí)    時(shí)間: 2025-3-22 18:54

作者: metropolitan    時(shí)間: 2025-3-23 00:36
Optimized Packing Soft Convex Polygonsrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach, whereby knowledge about the effectiveness of mitigating countermeasures is used to g
作者: Simulate    時(shí)間: 2025-3-23 02:00

作者: HERE    時(shí)間: 2025-3-23 09:08

作者: CON    時(shí)間: 2025-3-23 11:40
https://doi.org/10.1007/978-3-030-87495-7mata evaluation we mean that one participant has a finite state machine and the other participant has a sequence, and at the end of the protocol the sequence owner learns whether the machine accepts the sequence. A protocol was given in [18], but it required .(.) rounds (where . is the number of cha
作者: Insatiable    時(shí)間: 2025-3-23 16:04
https://doi.org/10.1007/978-3-030-87495-7y, not only contributes to the democratization of healthcare, by reaching far-away populations, but also makes it possible for elderly and chronically-ill patients to have their health monitored while in the comfort of their homes. Despite all of these advantages, however, patients are still resisti
作者: 隱語(yǔ)    時(shí)間: 2025-3-23 18:21
https://doi.org/10.1007/978-3-030-87495-7alicious transactions. The model suggested in this paper considers three main factors: the quality of intrusion detection, the probability of intrusion, and the cost structure of an organization whose data is protected by the intrusion detection system. We developed a step by step approach that help
作者: 騷擾    時(shí)間: 2025-3-24 00:14

作者: 帶傷害    時(shí)間: 2025-3-24 02:24
https://doi.org/10.1007/978-3-030-69839-3ul access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of
作者: Incorporate    時(shí)間: 2025-3-24 10:15

作者: invert    時(shí)間: 2025-3-24 11:31
https://doi.org/10.1007/978-3-030-69839-3utomata and their derivatives. However Edit automata (EA) have been recently proposed to specify more powerful EMs. Being able to feign the execution of sensitive program actions, these EMs are supposed to enforce more security properties. However, feigning program actions will usually make the prog
作者: 減震    時(shí)間: 2025-3-24 17:46

作者: Negligible    時(shí)間: 2025-3-24 20:09

作者: Resection    時(shí)間: 2025-3-25 02:32
Fatima Bekaddour,Chikh Mohammed Amineing layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients..In this paper, we address this issue and propose a novel mod
作者: 涂掉    時(shí)間: 2025-3-25 05:41

作者: 單獨(dú)    時(shí)間: 2025-3-25 08:40

作者: Altitude    時(shí)間: 2025-3-25 13:48

作者: 赤字    時(shí)間: 2025-3-25 18:49
https://doi.org/10.1007/978-3-319-19578-0ds by patients - linked via health information exchange. There is an emergent need to provide secure access to information spread across multiple repositories for health care providers (e.g., physicians, nurses, home health aides, etc.) who collaborate with one another across cyberspace to deliver p
作者: 刪除    時(shí)間: 2025-3-25 23:37

作者: vitrectomy    時(shí)間: 2025-3-26 01:56
Implementing Reflective Access Control in SQLAC aids the management of database access controls by improving the expressiveness of policies. The Transaction Datalog language provides a powerful syntax and semantics for expressing RDBAC policies, however there is no efficient implementation of this language for practical database systems. We de
作者: Subjugate    時(shí)間: 2025-3-26 04:18

作者: 責(zé)問    時(shí)間: 2025-3-26 08:49

作者: 壁畫    時(shí)間: 2025-3-26 14:54
Towards System Integrity Protection with Graph-Based Policy Analysisa system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to the high complexity of policy configurations in contem
作者: 不遵守    時(shí)間: 2025-3-26 20:17
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluationmata evaluation we mean that one participant has a finite state machine and the other participant has a sequence, and at the end of the protocol the sequence owner learns whether the machine accepts the sequence. A protocol was given in [18], but it required .(.) rounds (where . is the number of cha
作者: 喚醒    時(shí)間: 2025-3-27 00:26
Privacy-Preserving Telemonitoring for eHealthy, not only contributes to the democratization of healthcare, by reaching far-away populations, but also makes it possible for elderly and chronically-ill patients to have their health monitored while in the comfort of their homes. Despite all of these advantages, however, patients are still resisti
作者: CLAP    時(shí)間: 2025-3-27 02:29

作者: drusen    時(shí)間: 2025-3-27 06:35

作者: myriad    時(shí)間: 2025-3-27 10:51
Distributed Privilege Enforcement in PACSul access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of
作者: 必死    時(shí)間: 2025-3-27 17:20

作者: neologism    時(shí)間: 2025-3-27 20:06

作者: defuse    時(shí)間: 2025-3-27 22:43
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providerssuch data sharing is subject to constraints imposed by privacy of individuals or data subjects as well as data confidentiality of institutions or data providers. Concretely, given a query spanning multiple databases, query results should not contain individually identifiable information. In addition
作者: figurine    時(shí)間: 2025-3-28 06:05
Detecting Inference Channels in Private Multimedia Data , Social Networkses to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addr
作者: 高度    時(shí)間: 2025-3-28 07:08
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clientsing layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients..In this paper, we address this issue and propose a novel mod
作者: 戲法    時(shí)間: 2025-3-28 13:44
Data Is Key: Introducing the Data-Based Access Control Paradigmwe suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given . pieces of data, an agent is able to recover all . items once she knows . of
作者: 引水渠    時(shí)間: 2025-3-28 15:58

作者: 兩棲動(dòng)物    時(shí)間: 2025-3-28 20:59
PAES: Policy-Based Authority Evaluation Schemelar functionalities and often have two shortcomings: a centralised architecture and a lack of concern for the trust and privacy of data recipients. To access the data, recipients must present their credentials to a policy evaluation authority, which they cannot choose and may not trust. Furthermore,
作者: 玩忽職守    時(shí)間: 2025-3-29 02:25

作者: 兒童    時(shí)間: 2025-3-29 06:16

作者: 否認(rèn)    時(shí)間: 2025-3-29 07:22

作者: 高爾夫    時(shí)間: 2025-3-29 13:28

作者: cumulative    時(shí)間: 2025-3-29 19:28

作者: Inscrutable    時(shí)間: 2025-3-29 21:05
https://doi.org/10.1007/978-3-030-69839-3on to ensure anonymity of data providers in addition to that of data subjects, and a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database while maintaining both privacy constraints.
作者: 逃避現(xiàn)實(shí)    時(shí)間: 2025-3-30 00:07
Fatima Bekaddour,Chikh Mohammed Aminee remaining information in clear form at the external (honest-but-curious) server. We model the problem and provide a solution for it aiming at minimizing the data stored at the client. We also illustrate the execution of queries on the fragmented information.
作者: 使更活躍    時(shí)間: 2025-3-30 07:28
An Approach to Security Policy Configuration Using Semantic Threat Graphsoach to representing and reasoning over this knowledge is taken. A case study on Network Access Controls demonstrates how threats can be analyzed and how automated configuration recommendations can be made based on catalogues of best-practice countermeasures.
作者: extinguish    時(shí)間: 2025-3-30 10:52

作者: 憤慨點(diǎn)吧    時(shí)間: 2025-3-30 13:59

作者: Feckless    時(shí)間: 2025-3-30 20:22
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providerson to ensure anonymity of data providers in addition to that of data subjects, and a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database while maintaining both privacy constraints.
作者: 慢慢沖刷    時(shí)間: 2025-3-30 23:56

作者: 形狀    時(shí)間: 2025-3-31 02:25

作者: 不能約    時(shí)間: 2025-3-31 05:43

作者: 多山    時(shí)間: 2025-3-31 13:14
Francisco de Asis López-Fuentesuirements which specify the reaction policy to enforce when intrusions are detected. We present in this article an extension of the OrBAC model by defining dynamic organizations and threat contexts to enable the expression and enforcement of reaction requirements.
作者: Badger    時(shí)間: 2025-3-31 17:26

作者: GRATE    時(shí)間: 2025-3-31 19:43

作者: Flu表流動(dòng)    時(shí)間: 2025-4-1 00:08
https://doi.org/10.1007/978-3-030-69839-3 failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants. Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead.
作者: 不可救藥    時(shí)間: 2025-4-1 05:07
Habib Mahi,Nezha Farhi,Kaouter Labedthem. The problem is similar to both secure sketches and secret sharing, and we show that both can be used as a basis for constructions. Examples of possible applications are granting access without credentials, recovering forgotten passwords and sharing personal data in social networks.
作者: 反感    時(shí)間: 2025-4-1 07:03
https://doi.org/10.1007/978-3-319-19578-0atient care. Are available security models capable of supporting collaborative access where providers are simultaneously modifying a patient’s medical record? To address this question, this paper details collaborative security extensions to NIST RBAC.
作者: Noctambulant    時(shí)間: 2025-4-1 12:19





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
驻马店市| 芒康县| 文安县| 汤原县| 什邡市| 榆社县| 玉树县| 溧阳市| 永丰县| 株洲县| 读书| 基隆市| 高阳县| 深州市| 遂宁市| 达孜县| 樟树市| 阿克苏市| 高阳县| 噶尔县| 孝感市| 奉贤区| 孝义市| 广元市| 翁牛特旗| 吉隆县| 洞口县| 平泉县| 涟水县| 巫山县| 新乐市| 双峰县| 和顺县| 随州市| 双柏县| 广西| 武强县| 时尚| 秦皇岛市| 屏东市| 孟村|