找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 96; 4th European Symposi Elisa Bertino,Helmut Kurth,Emilio Montolivo Conference proceedings 1996 Springer-Verla

[復(fù)制鏈接]
樓主: 深謀遠慮
21#
發(fā)表于 2025-3-25 03:42:03 | 只看該作者
The Possibility of Radical Reform?,agent systems. A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.
22#
發(fā)表于 2025-3-25 08:13:30 | 只看該作者
23#
發(fā)表于 2025-3-25 14:32:40 | 只看該作者
24#
發(fā)表于 2025-3-25 16:04:08 | 只看該作者
Lightweight micro-cash for the internet,rotocols for cash withdrawal, payment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.
25#
發(fā)表于 2025-3-25 20:49:50 | 只看該作者
Digital payment systems with passive anonymity-revoking trustees,but only in case of a justified suspicion. In this paper we propose the first efficient anonymous digital payment systems satisfying this requirement. The described basic protocol for anonymity revocation can be used in on-line or off-line payment systems.
26#
發(fā)表于 2025-3-26 02:10:06 | 只看該作者
Role hierarchies and constraints for lattice-based access controls,property) and no-write-up (strict *-property), can be easily accommodated in RBAC. Our results attest to the flexibility of RBAC and its ability to accommodate different policies by suitable configuration of role hierarchies and constraints.
27#
發(fā)表于 2025-3-26 04:42:44 | 只看該作者
An authorization model for federated systems,sk of specifying authorizations. A site can require to authenticate the user at each access or accept his identity as communicated by the federation. An access control algorithm describing controls to be enforced at the federation and at each local site under the different authentication and administrative options is presented.
28#
發(fā)表于 2025-3-26 11:43:02 | 只看該作者
29#
發(fā)表于 2025-3-26 15:45:44 | 只看該作者
Threat scenarios as a means to formally develop secure systems,specification. Security is defined as a particular relation on threat scenarios and systems. We show the usefulness of our approach by developing an authentic server component, thereby analysing two simple authentication protocols.
30#
發(fā)表于 2025-3-26 17:06:01 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 14:40
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
泰来县| 宾川县| 泰顺县| 嘉荫县| 南部县| 祁阳县| 海宁市| 柳林县| 岳池县| 贵定县| 江达县| 土默特右旗| 定兴县| 晴隆县| 安平县| 信丰县| 太仆寺旗| 泗水县| 佛学| 哈尔滨市| 呼玛县| 昔阳县| 临沧市| 察隅县| 石台县| 广灵县| 贵阳市| 海南省| 林州市| 峨眉山市| 仁怀市| 开江县| 连南| 河津市| 宁都县| 利津县| 突泉县| 临沂市| 塔城市| 岳池县| 东方市|