找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Risks and Security of Internet and Systems; 9th International Co Javier Lopez,Indrajit Ray,Bruno Crispo Conference proceedings 2015 Springe

[復(fù)制鏈接]
樓主: NK871
51#
發(fā)表于 2025-3-30 10:45:35 | 只看該作者
Towards a Full Support of Obligations in XACML,tensible Access Control Markup Language) proposes a conceptual architecture and a policy language to reflect this ideal design of policy-based systems.However, while rights are well-captured by authorizations, duties, also called obligations, are not well managed by XACML architecture. The current v
52#
發(fā)表于 2025-3-30 15:10:37 | 只看該作者
Managing Heterogeneous Access Control Models Cross-Organization,st suitable issue to secure this collaboration is using access control model. However access control model diversity makes it more complex to collaborate cross-organization, especially when each organization refuses to change its security policies, prefers to preserve its access control model and ne
53#
發(fā)表于 2025-3-30 17:00:16 | 只看該作者
ISER: A Platform for Security Interoperability of Multi-source Systems, different participants to collaborate, exchange data and interact among them in order to achieve a global goal. However, some security issues such as the malicious use of resources, disclosure of data or bad services can appear during this collaboration..In this paper, a new platform is proposed th
54#
發(fā)表于 2025-3-30 21:33:49 | 只看該作者
55#
發(fā)表于 2025-3-31 03:39:25 | 只看該作者
56#
發(fā)表于 2025-3-31 06:51:57 | 只看該作者
Regularity Based Decentralized Social Networks,ned by them; and the loss of control over the information contributed by their members. The attempts to create decentralized OSNs (DOSNs) enable each member of an OSN keeps its own data under its control, instead of surrendering it to a central place; providing its own access-control policy. However
57#
發(fā)表于 2025-3-31 10:07:10 | 只看該作者
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks,bination of anomaly, behavior and signature based techniques for detecting such zero-day attacks. The proposed approach detects obfuscated zero-day attacks with two-level evaluation, generates a new signature automatically and updates other sensors by using push technology via global hotfix feature.
58#
發(fā)表于 2025-3-31 15:47:07 | 只看該作者
Towards a Full Support of Obligations in XACML,he history of obligations fulfillment/violation. In this work, we propose an extension of XACML reference model that integrates obligation states in the decision making process. We have extended XACML language and architecture for a better obligations support and have shown how obligations are managed in our proposed extended XACML architecture: .
59#
發(fā)表于 2025-3-31 21:36:02 | 只看該作者
60#
發(fā)表于 2025-4-1 01:25:18 | 只看該作者
ISER: A Platform for Security Interoperability of Multi-source Systems,order to (1) provide?a secure virtualization of guests system, (2) create, model and manage systems secure interoperability, (3) verify the security policies and (4) monitor the system behavior. A case study is presented to illustrate the application of the platform.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 13:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
丹东市| 松滋市| 郸城县| 汝南县| 怀来县| 隆昌县| 蒙山县| 礼泉县| 平安县| 延庆县| 治县。| 卢氏县| 舟山市| 双流县| 呼和浩特市| 张家界市| 海宁市| 和平区| 东平县| 芮城县| 志丹县| 嘉祥县| 五指山市| 凤台县| 铜陵市| 桃江县| 东乡族自治县| 定安县| 昂仁县| 准格尔旗| 枣阳市| 合阳县| 房产| 甘南县| 望江县| 漯河市| 鄱阳县| 开封市| 庄河市| 保德县| 昭觉县|