蜡烛 发表于 2025-3-26 20:57:59
http://reply.papertrans.cn/15/1497/149638/149638_31.pngpaltry 发表于 2025-3-27 02:26:38
Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux,ross-layered permission assignment is devised based on some popular information security models such as RBAC, DTE and etc. And a corresponding prototype system is implemented based on Linux. Finally, some preliminary test results are analyzed and further research directions are pointed out.意见一致 发表于 2025-3-27 09:14:37
Trust-Risk-Game Based Access Control in Cross Domain Application,represent the confidence in the peer. To appease people’s anxiety about loss, a model of risk assessment is also presented to indicate impacts on resources. At the end of this paper, to describe how our mechanism works, a scenario is provided.灾祸 发表于 2025-3-27 12:04:19
http://reply.papertrans.cn/15/1497/149638/149638_34.pngbeta-cells 发表于 2025-3-27 17:16:36
Vladislava Churuksaeva,Alexander Starchenkot (Iris Images) by using a set of properly located sensors. We are considering camera as a high quality sensor. Iris Images are typically color images that are processed to gray scale images. Then the Feature extraction algorithm is used to detect “IRIS Effective Region (IER)” and then extract featuFemish 发表于 2025-3-27 21:50:46
Lecture Notes in Computer Science In this scheme the messages are encoded in the entanglement state. our scheme has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. Security analysis indicates that this scsyncope 发表于 2025-3-27 23:35:19
Andrey Epikhin,Matvey Kraposhinty. Nowadays, Linux is becoming more and more popular for its excellent performance and open source philosophy. Meanwhile, access control mechanisms of Linux have been improved ceaselessly to satisfy arisen security requirements. For instance, SELinux is integrated into Linux kernel 2.6 and it can e行业 发表于 2025-3-28 02:44:22
http://reply.papertrans.cn/15/1497/149638/149638_38.png大漩涡 发表于 2025-3-28 07:40:00
Dariusz Sychel,Przemysław Klęsk,Aneta Bera issues. As a result, citizens want to trust on a secured E-government network. Generally, E-government security and E-commerce security are the same, but E-government has some extra features. Usually government agencies can cooperate better than businesses, because, most of them are connected to foAssault 发表于 2025-3-28 13:52:34
http://reply.papertrans.cn/15/1497/149638/149638_40.png