找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Research Directions in Data and Applications Security; IFIP TC11 / WG11.3 S Ehud Gudes,Sujeet Shenoi Book 2003 IFIP International Federatio

[復(fù)制鏈接]
查看: 48637|回復(fù): 57
樓主
發(fā)表于 2025-3-21 18:48:17 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Research Directions in Data and Applications Security
副標(biāo)題IFIP TC11 / WG11.3 S
編輯Ehud Gudes,Sujeet Shenoi
視頻videohttp://file.papertrans.cn/828/827750/827750.mp4
叢書名稱IFIP Advances in Information and Communication Technology
圖書封面Titlebook: Research Directions in Data and Applications Security; IFIP TC11 / WG11.3 S Ehud Gudes,Sujeet Shenoi Book 2003 IFIP International Federatio
描述.Research Directions in Data and Applications Security. describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: .-Role-Based Access Control; .-Database Security; .-XML Security; .-Data Mining and Inference; .-Multimedia System Security; .-Network Security; .-Public Key Infrastructure; .-Formal Methods and Protocols; .-Security and Privacy..
出版日期Book 2003
關(guān)鍵詞Access; Bridge; Extensible Markup Language (XML); access control; algorithms; communication; data mining; d
版次1
doihttps://doi.org/10.1007/978-0-387-35697-6
isbn_softcover978-1-4757-6413-0
isbn_ebook978-0-387-35697-6Series ISSN 1868-4238 Series E-ISSN 1868-422X
issn_series 1868-4238
copyrightIFIP International Federation for Information Processing 2003
The information of publication is updating

書目名稱Research Directions in Data and Applications Security影響因子(影響力)




書目名稱Research Directions in Data and Applications Security影響因子(影響力)學(xué)科排名




書目名稱Research Directions in Data and Applications Security網(wǎng)絡(luò)公開度




書目名稱Research Directions in Data and Applications Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Research Directions in Data and Applications Security被引頻次




書目名稱Research Directions in Data and Applications Security被引頻次學(xué)科排名




書目名稱Research Directions in Data and Applications Security年度引用




書目名稱Research Directions in Data and Applications Security年度引用學(xué)科排名




書目名稱Research Directions in Data and Applications Security讀者反饋




書目名稱Research Directions in Data and Applications Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:32:40 | 只看該作者
Using X.509 Attribute Certificates for Role-Based EAMtration are defined and a security architecture is discussed. We also demonstrate the feasibility of our approach through a proof-of-concept implementation. Several issues from our experiment are briefly discussed as well.
板凳
發(fā)表于 2025-3-22 00:34:50 | 只看該作者
Towards Secure XML Federationsecture, we address security issues of XML federations, especially the authentication and authorization of federation users. We point out several problems in applying existing access control schemes and give our solutions.
地板
發(fā)表于 2025-3-22 08:04:14 | 只看該作者
5#
發(fā)表于 2025-3-22 10:53:41 | 只看該作者
6#
發(fā)表于 2025-3-22 13:24:58 | 只看該作者
Privilege Administration for the Role Graph Modelph model, it is assumed that when privilege . is present in a role, all privileges that might be implied by . are also present in the role. This paper gives revised algorithms to ensure that this is done, using a model for implication of permissions originally developed for object-oriented databases
7#
發(fā)表于 2025-3-22 20:44:04 | 只看該作者
Role Delegation for a Resource-Based Security Modelimensions. One dimension is delegation, where an authorized individual may delegate all or part of his/her authority to another individual, increasing security risk. This paper explores the inclusion of role delegation into a unified security model/enforcement framework that controls access to softw
8#
發(fā)表于 2025-3-22 21:14:46 | 只看該作者
Using X.509 Attribute Certificates for Role-Based EAMntrol (RBAC) and X.509 attribute certificates for scalable and interoperable authorization. Compared with previous works in this area, we show that our approach can overcome the problems of previous solutions and broaden RBAC’s applicability into large-scale networks. The components for role adminis
9#
發(fā)表于 2025-3-23 05:20:16 | 只看該作者
Implementing Workflow Systems processes and the responsibilities of individuals within these processes with relative ease. It is further possible to implement complex constraints including security and access control with workflow systems. Separation-of-duty is a security constraint that recently started to find its way into th
10#
發(fā)表于 2025-3-23 07:23:02 | 只看該作者
Multiphase Damage Confinement System for Databasesaired. Traditional database damage confinement is ., that is, a damaged data item is confined only after it is identified as corrupted, and one- phase damage confinement has a serious problem, that is, during damage assessment serious damage spreading can be caused. In this paper, we present the des
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-21 17:19
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
高要市| 小金县| 屯门区| 顺昌县| 康保县| 西贡区| 涟水县| 蒙阴县| 吉林市| 安图县| 武陟县| 大洼县| 贵溪市| 宁晋县| 海门市| 光泽县| 甘谷县| 项城市| 瑞金市| 托克逊县| 泗阳县| 沾益县| 平昌县| 黄梅县| 伊宁县| 盐源县| 嘉鱼县| 沙坪坝区| 温泉县| 庆云县| 蒲城县| 井研县| 京山县| 扎鲁特旗| 崇文区| 泾川县| 晋中市| 大新县| 罗定市| 福建省| 克东县|