骚动 发表于 2025-3-28 16:47:46
http://reply.papertrans.cn/24/2337/233638/233638_41.png无思维能力 发表于 2025-3-28 22:33:49
From Qualitative to Quantitative Enforcement of Security Policyof the quantitative challenges of runtime enforcement, which focus on the problem of defining what does it mean for a monitor to be better than another one, and we sketch several directions that could be explored to tackle this issue.VAN 发表于 2025-3-28 23:31:45
Design and Implementation of a Cloud-Based Assured Information Sharing Systemolicies. We describe a cloud-based information sharing framework that utilizes Semantic Web technologies; our framework consists of a policy engine that reasons about the policies for information sharing purposes and a secure data engine that stores and queries data in the cloud. We also describe the operation of our system with example policies.初次登台 发表于 2025-3-29 03:37:22
http://reply.papertrans.cn/24/2337/233638/233638_44.png自负的人 发表于 2025-3-29 10:00:23
http://reply.papertrans.cn/24/2337/233638/233638_45.pngGrandstand 发表于 2025-3-29 13:36:04
Conference proceedings 2012access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.GULF 发表于 2025-3-29 16:40:25
http://reply.papertrans.cn/24/2337/233638/233638_47.png引导 发表于 2025-3-29 20:33:30
http://reply.papertrans.cn/24/2337/233638/233638_48.pngMortal 发表于 2025-3-30 02:40:32
https://doi.org/10.1007/978-3-658-26737-7prehensive semantic model for security event management. Besides the description of security incidents, the model further allows to add conditions over the system state, define countermeasures, and link to external security models.Proponent 发表于 2025-3-30 08:03:09
Telemedizin – Das Recht der Fernbehandlungbehavioral analysis on higher semantic level. We observe that many critical computer systems serve a specific purpose and are expected to run strictly limited sets of software. We model this behavior by creating customized normalcy profile of this system and evaluate how well does anomaly based detection work in this scenario.