標(biāo)題: Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern [打印本頁] 作者: indulge 時(shí)間: 2025-3-21 17:31
書目名稱Data and Applications Security and Privacy XXVIII影響因子(影響力)
書目名稱Data and Applications Security and Privacy XXVIII影響因子(影響力)學(xué)科排名
書目名稱Data and Applications Security and Privacy XXVIII網(wǎng)絡(luò)公開度
書目名稱Data and Applications Security and Privacy XXVIII網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data and Applications Security and Privacy XXVIII被引頻次
書目名稱Data and Applications Security and Privacy XXVIII被引頻次學(xué)科排名
書目名稱Data and Applications Security and Privacy XXVIII年度引用
書目名稱Data and Applications Security and Privacy XXVIII年度引用學(xué)科排名
書目名稱Data and Applications Security and Privacy XXVIII讀者反饋
書目名稱Data and Applications Security and Privacy XXVIII讀者反饋學(xué)科排名
作者: Eviction 時(shí)間: 2025-3-21 21:37 作者: 用手捏 時(shí)間: 2025-3-22 00:42
Conference proceedings 2014, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.作者: Fracture 時(shí)間: 2025-3-22 08:23 作者: biopsy 時(shí)間: 2025-3-22 10:06
978-3-662-43935-7IFIP International Federation for Information Processing 2014作者: HUSH 時(shí)間: 2025-3-22 14:18
Yifeng Zheng,Huayi Duan,Cong Wangerent approaches to ensuring data integrity, one of the most important security concerns in database outsourcing. However, to the best of our knowledge, existing approaches require modification of DBMSs to facilitate data authentication, which greatly hampers their adoption in practice. In this pape作者: HUSH 時(shí)間: 2025-3-22 19:19
Hui Guo,Zhenfeng Zhang,Jing Xu,Mingyuan Xiao be outsourced and in an another hand to formalize the set of security mechanisms that can be used for the protection of outsourced data. Based on the formalization of security and utility requirements and security mechanisms properties, we formally identify the best mechanisms, and the best way to作者: DUST 時(shí)間: 2025-3-22 21:18 作者: explicit 時(shí)間: 2025-3-23 02:00 作者: Project 時(shí)間: 2025-3-23 07:31 作者: 控訴 時(shí)間: 2025-3-23 10:25 作者: 四指套 時(shí)間: 2025-3-23 17:39
Robert Lyerly,Xiaoguang Wang,Binoy Ravindrany organizations to monitor network traffic and the use of portable storage devices. These solutions often produce a large number of alerts, whose analysis is time-consuming and costly for organizations. To effectively handle leakage incidents, organizations should be able to focus on the most severe作者: 祖?zhèn)髫?cái)產(chǎn) 時(shí)間: 2025-3-23 21:32 作者: 財(cái)產(chǎn) 時(shí)間: 2025-3-24 01:03 作者: 有權(quán)威 時(shí)間: 2025-3-24 05:36 作者: foreign 時(shí)間: 2025-3-24 07:06 作者: 自制 時(shí)間: 2025-3-24 14:20 作者: Jubilation 時(shí)間: 2025-3-24 17:27 作者: 使熄滅 時(shí)間: 2025-3-24 21:53
Lecture Notes in Computer Sciencet all tasks are being attended and no constraint is violated.In particular, we study two key questions: (i) Will the workflow still be satisfiable given a change? (ii) If the answer is yes, how to find a satisfying assignment with the minimum perturbation to the old system? We consider various types作者: 發(fā)生 時(shí)間: 2025-3-25 00:02 作者: 煩人 時(shí)間: 2025-3-25 06:16
Lecture Notes in Computer Science database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions作者: 放逐 時(shí)間: 2025-3-25 09:20
Computer Security – ESORICS 2021ns can result in policies by which a user can acquire permissions that may compromise some security goals. In particular, we are interested in sequences of safety problems generated by modifications (namely, adding/deleting an element to/from the set of possible actions) to an ARBAC policy accommoda作者: 脊椎動(dòng)物 時(shí)間: 2025-3-25 15:26
Peter Schwabe,Douglas Stebila,Thom Wiggersms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute作者: lipoatrophy 時(shí)間: 2025-3-25 18:23
Lecture Notes in Computer Sciencethorization policies are typically specified in terms of relationships of certain types and/or depth between the access requester and the target. However, using relationships alone is often not sufficient to enforce various security and privacy requirements that meet the expectation fromtoday’sOSN u作者: Lipoprotein 時(shí)間: 2025-3-25 22:14 作者: 很是迷惑 時(shí)間: 2025-3-26 02:50 作者: 要求比…更好 時(shí)間: 2025-3-26 07:40
Optimizing Integrity Checks for Join Queries in the Cloud,ence, just relying on the storage and computational power offered by external providers. Also, users can enjoy a diversity and variety of offers, with the possibility of choosing services by different providers as they best suit their needs. With the growth of the market, economic factors have becom作者: 剛毅 時(shí)間: 2025-3-26 11:53 作者: 樂器演奏者 時(shí)間: 2025-3-26 12:45
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds, by her and the keywords contained in the documents. We propose two progressively refined privacy-preserving conjunctive symmetric searchable encryption (PCSSE) schemes that allow cloud servers to perform conjunctive keyword searches on encrypted documents with different privacy assurances. Our sche作者: 徹底檢查 時(shí)間: 2025-3-26 18:47 作者: Increment 時(shí)間: 2025-3-26 22:24 作者: FOR 時(shí)間: 2025-3-27 01:50 作者: reperfusion 時(shí)間: 2025-3-27 06:51
FSquaDRA: Fast Detection of Repackaged Applications,s to detect repackaged code and combat distribution of cloned applications. Today all existing techniques for repackaging detection are based on code similarity or feature (e.g., permission set) similarity evaluation. We propose a new approach to detect repackaging based on the resource files availa作者: 迅速飛過 時(shí)間: 2025-3-27 11:12 作者: Consequence 時(shí)間: 2025-3-27 13:59
Design Patterns for Multiple Stakeholders in Social Computing,ss control policy for protecting that content. The study of protection schemes for multiple stakeholders in social computing has captured the imagination of researchers, and general-purpose schemes for reconciling the differences of privacy stakeholders have been proposed..A challenge of existing mu作者: Jacket 時(shí)間: 2025-3-27 18:09
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure,bility of information, collaborative optimization problems can be formulated by different parties to jointly optimize their operations. However, this cannot usually be done without restraint since privacy/security concerns often inhibit the complete sharing of proprietary information. The field of p作者: 得罪 時(shí)間: 2025-3-28 00:52 作者: 河潭 時(shí)間: 2025-3-28 04:59 作者: gain631 時(shí)間: 2025-3-28 06:37
Consistent Query Plan Generation in Secure Cooperative Data Access,ng. We assume that each party stores its data in private relational databases, and is given a set of mutually agreed set of authorization rules that may involve joins over relations owned by one or more parties. Although the query planning problem in such an environment is similar to the one for dis作者: 使痛苦 時(shí)間: 2025-3-28 12:25 作者: musicologist 時(shí)間: 2025-3-28 16:24
Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ns can result in policies by which a user can acquire permissions that may compromise some security goals. In particular, we are interested in sequences of safety problems generated by modifications (namely, adding/deleting an element to/from the set of possible actions) to an ARBAC policy accommoda作者: 結(jié)果 時(shí)間: 2025-3-28 22:37
Mining Attribute-Based Access Control Policies from Logs,ms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute作者: 放肆的我 時(shí)間: 2025-3-29 02:30
Attribute-Aware Relationship-Based Access Control for Online Social Networks,thorization policies are typically specified in terms of relationships of certain types and/or depth between the access requester and the target. However, using relationships alone is often not sufficient to enforce various security and privacy requirements that meet the expectation fromtoday’sOSN u作者: CT-angiography 時(shí)間: 2025-3-29 06:12
Hunting the Unknown,, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain . a given query is anomalous, which further boosts the practical applicability of the system.作者: 骨 時(shí)間: 2025-3-29 08:18
https://doi.org/10.1007/978-3-030-29959-0osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.作者: 缺乏 時(shí)間: 2025-3-29 13:01 作者: 口味 時(shí)間: 2025-3-29 16:20
Robert Lyerly,Xiaoguang Wang,Binoy Ravindranhe ability to identify the data subjects of the leaked information. To specify and reason on data sensitivity in an application domain, we propose a data model representing the knowledge in the domain. We validate our approach by analyzing data leakages within a healthcare environment.作者: 來就得意 時(shí)間: 2025-3-29 22:25 作者: DALLY 時(shí)間: 2025-3-30 00:13
Computer Security – ESORICS 2020gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.作者: 浪費(fèi)物質(zhì) 時(shí)間: 2025-3-30 04:11 作者: HAUNT 時(shí)間: 2025-3-30 08:32 作者: 吝嗇性 時(shí)間: 2025-3-30 15:58
Optimizing Integrity Checks for Join Queries in the Cloud,osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.作者: 殺死 時(shí)間: 2025-3-30 20:24
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud,es queries on Kd-trees that are constructed from encrypted health records. It also prevents patients from inferring what health organizations are concerned about. We experimentally evaluate the performance of the proposed protocol and report on the results of implementation.作者: Ballad 時(shí)間: 2025-3-31 00:41 作者: Ingratiate 時(shí)間: 2025-3-31 04:42
Toward Software Diversity in Heterogeneous Networked Systems,in more complex scenarios by taking into consideration practical constraints, e.g., hosts may have diverse requirements based on different system prerequisites. We evaluate the performance of our algorithm through simulations on both simple and complex system models. The results confirm the effectiveness and scalability of our algorithm.作者: 印第安人 時(shí)間: 2025-3-31 08:31
Design Patterns for Multiple Stakeholders in Social Computing,gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.作者: slow-wave-sleep 時(shí)間: 2025-3-31 11:03
Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ne on the previous problem in a sequence. An experimental evaluation shows the better performances of an implementation of our technique with respect to the only available approach to solve safety problems for evolving ARBAC policies proposed by Gofman, Luo, and Yang.作者: A精確的 時(shí)間: 2025-3-31 14:30
Attribute-Aware Relationship-Based Access Control for Online Social Networks,hip-based access control (UURAC) model proposed in [6] is extended to enable such attribute-aware access control. We also present an enhanced path-checking algorithm to determine the existence of the required attributes and relationships in order to grant access.作者: Myocarditis 時(shí)間: 2025-3-31 20:22
0302-9743 nd Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cl作者: Malfunction 時(shí)間: 2025-4-1 01:20
Hui Guo,Zhenfeng Zhang,Jing Xu,Mingyuan Xiae formalization of security and utility requirements and security mechanisms properties, we formally identify the best mechanisms, and the best way to combine them to get the best trade-off between utility and security.作者: Encephalitis 時(shí)間: 2025-4-1 04:54
Peter Schwabe,Douglas Stebila,Thom Wiggersout the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem.作者: Ptosis 時(shí)間: 2025-4-1 09:18
Computer Security – ESORICS 2020is also able to hide the number of keywords in a query as well as the number of keywords contained in an encrypted document. Our searchable encryption scheme is efficient and at the same time it is secure against the adaptive chosen keywords attack.