找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern

[復(fù)制鏈接]
樓主: indulge
41#
發(fā)表于 2025-3-28 16:24:55 | 只看該作者
Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ns can result in policies by which a user can acquire permissions that may compromise some security goals. In particular, we are interested in sequences of safety problems generated by modifications (namely, adding/deleting an element to/from the set of possible actions) to an ARBAC policy accommoda
42#
發(fā)表于 2025-3-28 22:37:05 | 只看該作者
Mining Attribute-Based Access Control Policies from Logs,ms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute
43#
發(fā)表于 2025-3-29 02:30:40 | 只看該作者
Attribute-Aware Relationship-Based Access Control for Online Social Networks,thorization policies are typically specified in terms of relationships of certain types and/or depth between the access requester and the target. However, using relationships alone is often not sufficient to enforce various security and privacy requirements that meet the expectation fromtoday’sOSN u
44#
發(fā)表于 2025-3-29 06:12:50 | 只看該作者
Hunting the Unknown,, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain . a given query is anomalous, which further boosts the practical applicability of the system.
45#
發(fā)表于 2025-3-29 08:18:58 | 只看該作者
https://doi.org/10.1007/978-3-030-29959-0osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.
46#
發(fā)表于 2025-3-29 13:01:53 | 只看該作者
47#
發(fā)表于 2025-3-29 16:20:11 | 只看該作者
Robert Lyerly,Xiaoguang Wang,Binoy Ravindranhe ability to identify the data subjects of the leaked information. To specify and reason on data sensitivity in an application domain, we propose a data model representing the knowledge in the domain. We validate our approach by analyzing data leakages within a healthcare environment.
48#
發(fā)表于 2025-3-29 22:25:41 | 只看該作者
49#
發(fā)表于 2025-3-30 00:13:59 | 只看該作者
Computer Security – ESORICS 2020gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.
50#
發(fā)表于 2025-3-30 04:11:12 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-19 11:57
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
喀什市| 广宁县| 昭苏县| 澳门| 宁安市| 金乡县| 徐州市| 日土县| 通榆县| 齐齐哈尔市| 临猗县| 平定县| 怀来县| 浮山县| 永平县| 怀化市| 阿荣旗| 东方市| 顺义区| 伊川县| 镇安县| 宝山区| 江油市| 临洮县| 德化县| 天峨县| 靖边县| 图们市| 余江县| 常宁市| 儋州市| 横峰县| 洞口县| 靖宇县| 阿拉善右旗| 赤城县| 南溪县| 巴林左旗| 尼木县| 屯昌县| 太仆寺旗|