找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Research Directions in Data and Applications Security XVIII; IFIP TC11 / WG11.3 E Csilla Farkas,Pierangela Samarati Conference proceedings

[復(fù)制鏈接]
樓主: monster
31#
發(fā)表于 2025-3-26 21:11:03 | 只看該作者
Implementing Real-Time Update of Access Control Policiesy-critical applications. In this paper, we consider real-time update of access control policies that arise in a database system. Updating policy while they are in-effect can lead to potential security problems. In an earlier work, we presented an algorithm that not only prevents such security proble
32#
發(fā)表于 2025-3-27 04:30:17 | 只看該作者
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databasesation information is embedded into a database such that proof of ownership can be established by detecting the information in pirated data. However, most watermarking systems are vulnerable to the severe threat of additive attacks and this threat has not been studied formally. In an additive attack,
33#
發(fā)表于 2025-3-27 08:45:32 | 只看該作者
34#
發(fā)表于 2025-3-27 09:34:52 | 只看該作者
35#
發(fā)表于 2025-3-27 15:01:19 | 只看該作者
Information Flow Analysis for File Systems and Databases Using Labelss extends traditional multilevel security models by allowing users to declassify information in a distributed way. We extend this decentralized labels model developed by other authors by addressing specific issues that arise in accessing files and databases and in general in I/O operations. While re
36#
發(fā)表于 2025-3-27 20:08:07 | 只看該作者
37#
發(fā)表于 2025-3-27 22:42:01 | 只看該作者
38#
發(fā)表于 2025-3-28 05:04:53 | 只看該作者
Invited Talk - Towards Semantics-Aware Access Controlontrol models and languages. This paper outlines how context metadata can be referred to in semantics-aware access control policies and discusses the main open issues in designing, producing, and maintaining metadata for security.
39#
發(fā)表于 2025-3-28 09:10:04 | 只看該作者
40#
發(fā)表于 2025-3-28 13:37:22 | 只看該作者
Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephonese conversation. But, because public telephones do not encrypt voice, such teleconferences are vulnerable to eavesdropping. As a remedy, we offer secure bridges consisting of architectures and algorithms for eavesdropping resistant teleconferencing as a service over public switched telephone network
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-12 09:40
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
江陵县| 石林| 昌宁县| 安徽省| 铁岭县| 钟山县| 晋中市| 苏尼特左旗| 静宁县| 石屏县| 津市市| 花莲县| 宁蒗| 昭平县| 乌拉特中旗| 荆州市| 翼城县| 太白县| 玉环县| 西吉县| 老河口市| 建德市| 西乌珠穆沁旗| 东兴市| 达尔| 仲巴县| 泰兴市| 永昌县| 东乌珠穆沁旗| 新竹市| 桐城市| 德钦县| 浦东新区| 红桥区| 淅川县| 潜江市| 金乡县| 彰化县| 宁都县| 贵港市| 大新县|