骚动 发表于 2025-3-28 16:47:46

http://reply.papertrans.cn/24/2337/233638/233638_41.png

无思维能力 发表于 2025-3-28 22:33:49

From Qualitative to Quantitative Enforcement of Security Policyof the quantitative challenges of runtime enforcement, which focus on the problem of defining what does it mean for a monitor to be better than another one, and we sketch several directions that could be explored to tackle this issue.

VAN 发表于 2025-3-28 23:31:45

Design and Implementation of a Cloud-Based Assured Information Sharing Systemolicies. We describe a cloud-based information sharing framework that utilizes Semantic Web technologies; our framework consists of a policy engine that reasons about the policies for information sharing purposes and a secure data engine that stores and queries data in the cloud. We also describe the operation of our system with example policies.

初次登台 发表于 2025-3-29 03:37:22

http://reply.papertrans.cn/24/2337/233638/233638_44.png

自负的人 发表于 2025-3-29 10:00:23

http://reply.papertrans.cn/24/2337/233638/233638_45.png

Grandstand 发表于 2025-3-29 13:36:04

Conference proceedings 2012access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

GULF 发表于 2025-3-29 16:40:25

http://reply.papertrans.cn/24/2337/233638/233638_47.png

引导 发表于 2025-3-29 20:33:30

http://reply.papertrans.cn/24/2337/233638/233638_48.png

Mortal 发表于 2025-3-30 02:40:32

https://doi.org/10.1007/978-3-658-26737-7prehensive semantic model for security event management. Besides the description of security incidents, the model further allows to add conditions over the system state, define countermeasures, and link to external security models.

Proponent 发表于 2025-3-30 08:03:09

Telemedizin – Das Recht der Fernbehandlungbehavioral analysis on higher semantic level. We observe that many critical computer systems serve a specific purpose and are expected to run strictly limited sets of software. We model this behavior by creating customized normalcy profile of this system and evaluate how well does anomaly based detection work in this scenario.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Computer Network Security; 6th International Co Igor Kotenko,Victor Skormin Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 2