找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 92; Second European Symp Yves Deswarte,Gérard Eizenberg,Jean-Jacques Quisqu Conference proceedings 1992 Springe

[復(fù)制鏈接]
查看: 16929|回復(fù): 53
樓主
發(fā)表于 2025-3-21 18:54:48 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Computer Security - ESORICS 92
副標(biāo)題Second European Symp
編輯Yves Deswarte,Gérard Eizenberg,Jean-Jacques Quisqu
視頻videohttp://file.papertrans.cn/234/233876/233876.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Computer Security - ESORICS 92; Second European Symp Yves Deswarte,Gérard Eizenberg,Jean-Jacques Quisqu Conference proceedings 1992 Springe
描述This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l‘information et des syst mes) in cooperation with a large number of national and international societies and institutes.?
出版日期Conference proceedings 1992
關(guān)鍵詞Communication Security; Computer Security; Computersicherheit; Data Integrity; Database; Datenbankensiche
版次1
doihttps://doi.org/10.1007/BFb0013888
isbn_softcover978-3-540-56246-7
isbn_ebook978-3-540-47488-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 1992
The information of publication is updating

書目名稱Computer Security - ESORICS 92影響因子(影響力)




書目名稱Computer Security - ESORICS 92影響因子(影響力)學(xué)科排名




書目名稱Computer Security - ESORICS 92網(wǎng)絡(luò)公開度




書目名稱Computer Security - ESORICS 92網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Security - ESORICS 92被引頻次




書目名稱Computer Security - ESORICS 92被引頻次學(xué)科排名




書目名稱Computer Security - ESORICS 92年度引用




書目名稱Computer Security - ESORICS 92年度引用學(xué)科排名




書目名稱Computer Security - ESORICS 92讀者反饋




書目名稱Computer Security - ESORICS 92讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:46:05 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:18:51 | 只看該作者
地板
發(fā)表于 2025-3-22 07:23:28 | 只看該作者
The Coming of the Mass Market, 1850–1914I environment are presented. We describe then a protocol for the exchange and evaluation of both . and CP, ., hence ensuring a secure propagation of trust and knowledge over the network. Finally, the Added value of the given scheme is discussed in relation to certificate‘s establishment and revocati
5#
發(fā)表于 2025-3-22 11:02:47 | 只看該作者
6#
發(fā)表于 2025-3-22 13:14:13 | 只看該作者
Type-level access controls for distributed structurally object-oriented database systems security context of a process the type-rights of this process. Our model has virtually no built-in, enforced policies; it allows users to realize a wide range of application-specific security policies. It supports multiple inheritance; in order to prevent inconsistent rights on types with common su
7#
發(fā)表于 2025-3-22 18:31:48 | 只看該作者
Verification and modelling of authentication protocolsnstrumented as a verification tool which also allows for modelling the different protocol participants as finite state machines. Also, actions of intruders, consequences of such intrusions, and the respective counter-measures can be modelled and simulated.
8#
發(fā)表于 2025-3-22 23:45:12 | 只看該作者
Associating metrics to certification pathsI environment are presented. We describe then a protocol for the exchange and evaluation of both . and CP, ., hence ensuring a secure propagation of trust and knowledge over the network. Finally, the Added value of the given scheme is discussed in relation to certificate‘s establishment and revocati
9#
發(fā)表于 2025-3-23 04:32:59 | 只看該作者
An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributto a potential intruder. This technique can be applied to application objects and/or to the objects used in the implementation of the basic object-oriented system. The paper illustrates the technique using a detailed example, of an “electronic diary”, that has been designed using Eiffel, and experim
10#
發(fā)表于 2025-3-23 09:24:00 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-14 18:51
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
招远市| 金堂县| 静乐县| 壤塘县| 竹北市| 镇沅| 芒康县| 平阴县| 无锡市| 南川市| 东莞市| 乳山市| 丹棱县| 石楼县| 志丹县| 太谷县| 濉溪县| 华阴市| 礼泉县| 深水埗区| 萍乡市| 巴塘县| 都匀市| 红河县| 天等县| 大冶市| 苍溪县| 封开县| 定边县| 惠州市| 全南县| 五大连池市| 绥阳县| 化州市| 阳新县| 新建县| 尼勒克县| 南丰县| 玉田县| 江门市| 河西区|